What Kinds of Things Do Dorks Connect to the Internet?
If we assume that Google has indexed most devices accidentally exposed to the internet, we can use the text we know appears in their login or administrative pages to find them. The advanced application of Google search operators is Google Dorking - using search operators to hunt for specific vulnerable devices through targeted search strings. Because Google is fantastic at indexing everything connected to the internet, it's possible to find files that are exposed accidentally and contain critical information for anyone to see.
You may not have thought of dorks as powerful, but with the right dorks, you can hack devices just by Googling the password to log in.