Statements (52)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Computer_security_technique
|
| gptkbp:alsoKnownAs |
Google dorking
|
| gptkbp:canBeBypassedBy |
Security through obscurity
|
| gptkbp:canFind |
Configuration files
Database dumps Login portals Error messages Backup files Camera feeds Exposed credentials Sensitive directories Vulnerable web applications |
| gptkbp:detects |
Security monitoring
Intrusion detection systems Web server logs |
| gptkbp:discusses |
YouTube tutorials
Online forums DEF CON presentations Black Hat presentations Books on hacking Cybersecurity training Penetration testing courses Security blogs Security conferences |
| gptkbp:documentedIn |
gptkb:Google_Hacking_Database
|
| gptkbp:firstDocumented |
Early 2000s
|
| gptkbp:involves |
Advanced search operators
|
| gptkbp:legalStatus |
Depends on intent and jurisdiction
|
| gptkbp:mitigatedBy |
Access controls
Regular audits Proper configuration Removing sensitive data from public web Robots.txt |
| gptkbp:popularizedBy |
gptkb:Johnny_Long
|
| gptkbp:relatedTo |
gptkb:Open-source_intelligence
Cybersecurity Ethical hacking |
| gptkbp:supportedBy |
Exposed files
Sensitive information Misconfigured websites |
| gptkbp:usedBy |
gptkb:Hackers
Penetration testers |
| gptkbp:usedFor |
Information gathering
Finding security vulnerabilities |
| gptkbp:uses |
gptkb:Google_Search
|
| gptkbp:violatedBy |
Terms of service
Computer crime laws |
| gptkbp:bfsParent |
gptkb:Marcus_Dork
gptkb:Johnny_Long gptkb:Google_Dorks |
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
Google hacking
|