Statements (51)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Computer security technique
|
gptkbp:alsoKnownAs |
Google dorking
|
gptkbp:canBeBypassedBy |
Security through obscurity
|
gptkbp:canFind |
Configuration files
Database dumps Login portals Error messages Backup files Camera feeds Exposed credentials Sensitive directories Vulnerable web applications |
gptkbp:detects |
Security monitoring
Intrusion detection systems Web server logs |
gptkbp:discusses |
YouTube tutorials
Online forums DEF CON presentations Black Hat presentations Books on hacking Cybersecurity training Penetration testing courses Security blogs Security conferences |
gptkbp:documentedIn |
gptkb:Google_Hacking_Database
|
gptkbp:firstDocumented |
Early 2000s
|
https://www.w3.org/2000/01/rdf-schema#label |
Google hacking
|
gptkbp:involves |
Advanced search operators
|
gptkbp:legalStatus |
Depends on intent and jurisdiction
|
gptkbp:mitigatedBy |
Access controls
Regular audits Proper configuration Removing sensitive data from public web Robots.txt |
gptkbp:popularizedBy |
gptkb:Johnny_Long
|
gptkbp:relatedTo |
gptkb:Open-source_intelligence
Cybersecurity Ethical hacking |
gptkbp:supportedBy |
Exposed files
Sensitive information Misconfigured websites |
gptkbp:usedBy |
gptkb:Hackers
Penetration testers |
gptkbp:usedFor |
Information gathering
Finding security vulnerabilities |
gptkbp:uses |
gptkb:Google_Search
|
gptkbp:violatedBy |
Terms of service
Computer crime laws |
gptkbp:bfsParent |
gptkb:Johnny_Long
gptkb:Google_Dorks |
gptkbp:bfsLayer |
7
|