At the surface level, Google dorking involves using specific modifiers to search data. For example, instead of searching the entire Web, users can click on tags like "image" or "site" to collect images or find information about a specific site. Users can utilize other commands like "filetype" and "datarange" to get other specific search results.
Although benign types of Google dorking simply use the resources that are available from Google, some forms of it are concerning to regulators and security specialists because they could indicate hacking or cyberattack reconnaissance. Hackers and other cyber-criminals can use these types of Google dorking to obtain unauthorized data or to exploit security vulnerabilities in websites, which is why this term is gaining a negative connotation from the security community.