Statements (19)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Google
|
gptkbp:can_be_dangerous_if_used_by |
malicious actors
|
gptkbp:can_be_used_to |
find vulnerabilities in websites
|
gptkbp:can_provide |
penetration testing
|
gptkbp:developed_by |
gptkb:Google
|
gptkbp:first_appearance |
sensitive data
misconfigured servers |
https://www.w3.org/2000/01/rdf-schema#label |
Google Dorks
|
gptkbp:includes |
advanced search operators
|
gptkbp:is_analyzed_in |
login portals
|
gptkbp:is_often_used_in |
ethical hackers
|
gptkbp:is_part_of |
OSINT (Open Source Intelligence)
|
gptkbp:is_popular_among |
security researchers
|
gptkbp:known_as |
Google hacking
|
gptkbp:skills |
search syntax
|
gptkbp:technique |
information gathering
|
gptkbp:used_for |
finding information on the internet
|
gptkbp:bfsParent |
gptkb:Open_Source_Intelligence_(OSINT)
|
gptkbp:bfsLayer |
4
|