Back to Library

Google Dork: inurl:server.cfg rcon password...

PRO

Finds exposed game server configuration files containing RCON passwords used for remote server administration.

Beginner Friendly
High risk - authorized use only
vulnerability

Google Dork Query:

••••••••••••••••••••••••••••••••••
0
Not verified

What It Does

This dork uses 'inurl:server.cfg' to find server configuration files and searches for 'rcon password' within them. RCON (Remote Console) passwords allow full administrative control over game servers. Exposed server.cfg files may contain plaintext RCON passwords for games like Counter-Strike, Half-Life, and other Source engine games.

Common Use Cases

  • Game Server Security Audit: Check if your game server configuration files are publicly accessible and leaking RCON administrative passwords.
  • Credential Exposure Detection: Find server.cfg files with exposed RCON passwords that could allow unauthorized remote server control.
  • Server Misconfiguration Discovery: Identify game servers with publicly browsable configuration directories that need access restrictions.

How to Use Safely

  1. Run the dork in Google to find indexed server.cfg files containing RCON passwords.
  2. Check if the configuration file exposes the RCON password in plaintext.
  3. Verify the game server type and determine the impact of exposed credentials.
  4. Notify the server owner and recommend blocking direct access to configuration files.

Responsible Use Required

This dork should only be used on systems you own or have explicit authorization to test. Unauthorized access to computer systems is illegal. Always follow ethical guidelines and obtain proper permission before testing.