<s>
Google	B-Application
hacking	I-Application
,	O
also	O
named	O
Google	B-Application
dorking	I-Application
,	O
is	O
a	O
hacker	O
technique	O
that	O
uses	O
Google	B-Application
Search	O
and	O
other	O
Google	B-Application
applications	O
to	O
find	O
security	O
holes	O
in	O
the	O
configuration	B-General_Concept
and	O
computer	O
code	O
that	O
websites	O
are	O
using	O
.	O
</s>
<s>
Google	B-Application
hacking	I-Application
involves	O
using	O
advanced	O
operators	O
in	O
the	B-Application
Google	I-Application
search	B-Application
engine	I-Application
to	O
locate	O
specific	O
sections	O
of	O
text	O
on	O
websites	O
that	O
are	O
evidence	O
of	O
vulnerabilities	O
,	O
for	O
example	O
specific	O
versions	O
of	O
vulnerable	O
Web	B-Application
applications	I-Application
.	O
</s>
<s>
It	O
is	O
normal	O
for	O
default	B-General_Concept
installations	O
of	O
applications	O
to	O
include	O
their	O
running	O
version	O
in	O
every	O
page	O
they	O
serve	O
,	O
for	O
example	O
,	O
"	O
Powered	O
by	O
XOOPS	O
2.2.3	O
Final	O
"	O
,	O
which	O
can	O
be	O
used	O
to	O
search	O
for	O
websites	O
running	O
vulnerable	O
versions	O
.	O
</s>
<s>
The	O
concept	O
of	O
"	O
Google	B-Application
hacking	I-Application
"	O
dates	O
back	O
to	O
2002	O
,	O
when	O
Johnny	O
Long	O
began	O
to	O
collect	O
Google	B-Application
search	O
queries	O
that	O
uncovered	O
vulnerable	O
systems	O
and/or	O
sensitive	O
information	O
disclosures	O
–	O
labeling	O
them	O
googleDorks	O
.	O
</s>
<s>
The	O
list	O
of	O
Google	B-Application
Dorks	I-Application
grew	O
into	O
a	O
large	O
dictionary	O
of	O
queries	O
,	O
which	O
were	O
eventually	O
organized	O
into	O
the	O
original	O
Google	B-Application
Hacking	I-Application
Database	O
(	O
GHDB	O
)	O
in	O
2004	O
.	O
</s>
<s>
Concepts	O
explored	O
in	O
Google	B-Application
hacking	I-Application
have	O
been	O
extended	O
to	O
other	O
search	B-Application
engines	I-Application
,	O
such	O
as	O
Bing	B-Application
and	O
Shodan	O
.	O
</s>
<s>
Automated	O
attack	O
tools	O
use	O
custom	O
search	O
dictionaries	O
to	O
find	O
vulnerable	O
systems	O
and	O
sensitive	O
information	O
disclosures	O
in	O
public	O
systems	O
that	O
have	O
been	O
indexed	O
by	O
search	B-Application
engines	I-Application
.	O
</s>
<s>
Google	B-Application
Dorking	I-Application
has	O
been	O
involved	O
in	O
some	O
notorious	O
cybercrime	O
cases	O
,	O
such	O
as	O
the	O
Bowman	O
Avenue	O
Dam	O
hack	O
and	O
the	O
CIA	O
breach	O
where	O
around	O
70%	O
of	O
its	O
worldwide	O
networks	O
were	O
compromised	O
.	O
</s>
<s>
Kashman	O
argues	O
that	O
while	O
Google	B-Application
Dorking	I-Application
is	O
technically	O
legal	O
,	O
it	O
has	O
often	O
been	O
used	O
to	O
carry	O
out	O
cybercrime	O
and	O
frequently	O
leads	O
to	O
violations	O
of	O
the	O
Computer	O
Fraud	O
and	O
Abuse	O
Act	O
.	O
</s>
<s>
Robots.txt	O
is	O
a	O
well	O
known	O
file	O
for	O
search	B-Application
engine	I-Application
optimization	O
and	O
protection	O
against	O
Google	B-Application
dorking	I-Application
.	O
</s>
<s>
It	O
involves	O
the	O
use	O
of	O
robots.txt	O
to	O
disallow	O
everything	O
or	O
specific	O
endpoints	O
(	O
hackers	O
can	O
still	O
search	O
robots.txt	O
for	O
endpoints	O
)	O
which	O
prevents	O
Google	B-Application
bots	O
from	O
crawling	O
sensitive	O
endpoints	O
such	O
as	O
admin	O
panels	O
.	O
</s>
