Statements (36)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Search_technique
|
| gptkbp:alsoKnownAs |
gptkb:Google_hacking
|
| gptkbp:canFind |
personal information
configuration files error messages exposed passwords login portals vulnerable servers |
| gptkbp:countermeasures |
robots.txt
regular security audits proper configuration of web servers removal of sensitive files from public access |
| gptkbp:documentedIn |
gptkb:Google_Hacking_Database
|
| gptkbp:involves |
advanced search operators
|
| gptkbp:operator |
ext:
filetype: intext: intitle: inurl: site: |
| gptkbp:originatedIn |
early 2000s
|
| gptkbp:popularizedBy |
gptkb:Johnny_Long
|
| gptkbp:relatedTo |
gptkb:OSINT
information security penetration testing ethical hacking |
| gptkbp:riskFactor |
can be used for malicious purposes
may expose sensitive data |
| gptkbp:usedBy |
cybersecurity professionals
penetration testers |
| gptkbp:usedFor |
security testing
finding sensitive information |
| gptkbp:uses |
gptkb:Google_Search
|
| gptkbp:bfsParent |
gptkb:Google_Dorks
|
| gptkbp:bfsLayer |
8
|
| http://www.w3.org/2000/01/rdf-schema#label |
Google Dorking
|