Statements (36)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Search technique
|
gptkbp:alsoKnownAs |
gptkb:Google_hacking
|
gptkbp:canFind |
personal information
configuration files error messages exposed passwords login portals vulnerable servers |
gptkbp:countermeasures |
robots.txt
regular security audits proper configuration of web servers removal of sensitive files from public access |
gptkbp:documentedIn |
gptkb:Google_Hacking_Database
|
https://www.w3.org/2000/01/rdf-schema#label |
Google Dorking
|
gptkbp:involves |
advanced search operators
|
gptkbp:operator |
ext:
filetype: intext: intitle: inurl: site: |
gptkbp:originatedIn |
early 2000s
|
gptkbp:popularizedBy |
gptkb:Johnny_Long
|
gptkbp:relatedTo |
gptkb:OSINT
information security penetration testing ethical hacking |
gptkbp:riskFactor |
can be used for malicious purposes
may expose sensitive data |
gptkbp:usedBy |
cybersecurity professionals
penetration testers |
gptkbp:usedFor |
security testing
finding sensitive information |
gptkbp:uses |
gptkb:Google_Search
|
gptkbp:bfsParent |
gptkb:Google_Dorks
|
gptkbp:bfsLayer |
7
|