The Certified Ethical Hacker (CEH) Footprinting and Reconnaissance module defines Google Hacking, also known as Google Dorking, as the use of advanced search operators to uncover sensitive information unintentionally exposed on the public internet. This technique remains passive, making it ideal during early reconnaissance.
Google Hacking can reveal:
Exposed configuration files
Backup files (.bak, .old, .zip)
Error messages and stack traces
Source code fragments and scripting errors
These findings often indicate coding weaknesses or insecure configurations within a web application. CEH explicitly highlights Google Dorking as an effective way to identify web application weaknesses without scanning or exploiting the target directly.
Option C is correct because Google Hacking is commonly used to identify coding and configuration weaknesses exposed through indexed files.
Option A may be possible indirectly but is not the primary justification.
Option B is incorrect because Google does not index the Deep Web.
Option D involves internal network discovery, which Google Hacking cannot directly achieve.
CEH emphasizes Google Hacking as a powerful passive reconnaissance technique for discovering exposed vulnerabilities.