Statements (42)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Search_technique
|
| gptkbp:alsoKnownAs |
gptkb:Google_Dorking
gptkb:Google_hacking |
| gptkbp:category |
Computer security
Hacking techniques Search engine technology |
| gptkbp:documentedIn |
gptkb:Google_Hacking_Database
|
| gptkbp:firstDocumented |
2002
|
| gptkbp:involves |
Advanced search operators
Search queries |
| gptkbp:legalStatus |
Depends on intent and jurisdiction
|
| gptkbp:operator |
cache:
ext: filetype: intext: intitle: inurl: link: related: site: |
| gptkbp:popularizedBy |
gptkb:Johnny_Long
|
| gptkbp:relatedTo |
gptkb:Open-source_intelligence
Cybersecurity Search engine optimization Ethical hacking |
| gptkbp:requires |
gptkb:Internet_service_provider
Google account (optional) |
| gptkbp:riskFactor |
May be used for malicious purposes
May expose private data |
| gptkbp:supportedBy |
Configuration files
Database dumps Exposed files Login portals Sensitive information Vulnerable servers |
| gptkbp:usedFor |
Penetration testing
Information gathering Vulnerability assessment |
| gptkbp:uses |
gptkb:Google_Search
|
| gptkbp:bfsParent |
gptkb:OSINT
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Google Dorks
|