Statements (42)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Search technique
|
gptkbp:alsoKnownAs |
gptkb:Google_Dorking
gptkb:Google_hacking |
gptkbp:category |
Computer security
Hacking techniques Search engine technology |
gptkbp:documentedIn |
gptkb:Google_Hacking_Database
|
gptkbp:firstDocumented |
2002
|
https://www.w3.org/2000/01/rdf-schema#label |
Google Dorks
|
gptkbp:involves |
Advanced search operators
Search queries |
gptkbp:legalStatus |
Depends on intent and jurisdiction
|
gptkbp:operator |
cache:
ext: filetype: intext: intitle: inurl: link: related: site: |
gptkbp:popularizedBy |
gptkb:Johnny_Long
|
gptkbp:relatedTo |
gptkb:Open-source_intelligence
Cybersecurity Search engine optimization Ethical hacking |
gptkbp:requires |
Internet service provider
Google account (optional) |
gptkbp:riskFactor |
May be used for malicious purposes
May expose private data |
gptkbp:supportedBy |
Configuration files
Database dumps Exposed files Login portals Sensitive information Vulnerable servers |
gptkbp:usedFor |
Penetration testing
Information gathering Vulnerability assessment |
gptkbp:uses |
gptkb:Google_Search
|
gptkbp:bfsParent |
gptkb:OSINT
|
gptkbp:bfsLayer |
6
|