Statements (15)
Predicate | Object |
---|---|
gptkbp:instanceOf |
search technique
|
gptkbp:can_be |
login portals
|
https://www.w3.org/2000/01/rdf-schema#label |
Google Dorks
|
gptkbp:includes |
advanced search operators
|
gptkbp:introduced |
vulnerable websites
|
gptkbp:is_a_time_for |
information gathering
|
gptkbp:is_accessible_by |
database vulnerabilities
|
gptkbp:is_available_in |
file types
|
gptkbp:is_part_of |
OSINT_(Open_Source_Intelligence)
|
gptkbp:is_used_in |
security researchers
perform reconnaissance finding sensitive information |
gptkbp:produces |
Google_users
|
gptkbp:related_to |
ethical hacking
|
gptkbp:visitedBy |
exposed directories
|