Statements (36)
| Predicate | Object | 
|---|---|
| gptkbp:instanceOf | gptkb:Search_technique | 
| gptkbp:alsoKnownAs | gptkb:Google_hacking | 
| gptkbp:canFind | personal information configuration files error messages exposed passwords login portals vulnerable servers | 
| gptkbp:countermeasures | robots.txt regular security audits proper configuration of web servers removal of sensitive files from public access | 
| gptkbp:documentedIn | gptkb:Google_Hacking_Database | 
| gptkbp:involves | advanced search operators | 
| gptkbp:operator | ext: filetype: intext: intitle: inurl: site: | 
| gptkbp:originatedIn | early 2000s | 
| gptkbp:popularizedBy | gptkb:Johnny_Long | 
| gptkbp:relatedTo | gptkb:OSINT information security penetration testing ethical hacking | 
| gptkbp:riskFactor | can be used for malicious purposes may expose sensitive data | 
| gptkbp:usedBy | cybersecurity professionals penetration testers | 
| gptkbp:usedFor | security testing finding sensitive information | 
| gptkbp:uses | gptkb:Google_Search | 
| gptkbp:bfsParent | gptkb:Google_Dorks | 
| gptkbp:bfsLayer | 8 | 
| https://www.w3.org/2000/01/rdf-schema#label | Google Dorking |