Google hacking involves using search engine commands and complex queries to locate sensitive data and vulnerable devices. Hackers can find vulnerable websites and devices listed in Google's database, as well as error pages, login pages, and default pages that provide information. While against Google's terms, nothing can stop hackers from using these techniques to select targets for attack.