OSINT Professional Course

Open Source Intelligence Training • 144 Lessons • 30 Sections

Progress: 0/144 completed

Find Cameras & More with GHDB

22 min Lesson 9 Search Engine OSINT – Google Search Operators
LESSON 9

Lesson 9: Find Cameras and More With GHDB

The Google Hacking Database (GHDB) is a collection of specialized Google search queries (known as "Google dorks") designed to uncover sensitive or juicy information that is publicly indexed but not intended to be easily found. These dorks combine operators we've learned in previous lessons to locate things like vulnerable servers, exposed passwords, usernames, and more.

Finding Public Webcams

One common use of GHDB is to discover publicly accessible cameras.

Steps:

  1. Visit the Google Hacking Database site.
  2. Search for "camera" to find relevant dorks.
  3. Copy a dork from the results (examples are listed on the next pages of the category).
  4. Paste it directly into Google.com and run the search.

Many results will link directly to live camera feeds. Opening them often shows real-time video without requiring any login credentials.

Important Ethical Note:
If a camera, server, or IoT device prompts for a username/password (even if using default credentials), you are not authorized to log in. Accessing protected systems without permission is illegal. However, viewing truly public feeds that require no authentication is generally permissible as they are openly exposed.

Finding Exposed Files on Android Devices

Another useful dork category targets pictures and files hosted on Android devices (often due to misconfigured web servers or shared folders).

Running one of these dorks reveals indexed directories containing:

  • MP4 video files (downloadable and viewable)
  • Images/photos
  • Parent directory access showing folders like books, applications, and more

Extracting Metadata from Images/Videos

Files found this way often contain valuable metadata (EXIF data) embedded in images or videos. This can reveal:

  • Device model (e.g., Samsung phone)
  • Camera model and software used
  • Exact creation/modification dates and times
  • GPS coordinates (location where the photo was taken)

How to extract EXIF data:

  1. Copy the direct URL of an image.
  2. Search Google for "exif tool" and open a reputable online viewer (e.g., the first result).
  3. Paste the image URL into the tool and submit.
  4. View the extracted metadata details.

Online EXIF tools work with images, videos, and even PDFs to reveal hidden embedded information not visible in standard viewers.