![Mastering Kali Linux for Advanced Penetration Testing(Second Edition)](https://wfqqreader-1252317822.image.myqcloud.com/cover/17/36701017/b_36701017.jpg)
Using dork script to query Google
The first step for testers to understand Google Hacking Database is to understand all the advanced Google operators, just as the machine-level programming engineers must understand computer OP codes. These Google operators are part of the Google query; the syntax of searching is as follows:
Operator:itemthatyouwanttosearch
There is no space between the operation, the colon, and itemsthatyouwanttosearch. The following table lists all the advanced Google operators:
![](https://epubservercos.yuewen.com/484EEB/19470407201635606/epubprivate/OEBPS/Images/2.jpg?sign=1739527029-LkBD02aeE6lu6bgsCmYDK1wDnqXXVRsE-0-8aae6f940dd5725a368995cda6db7b25)
The following screenshot provides a simple Google dork to search for username in a log file.
The dork search is allintext:username filetype:log:
![](https://epubservercos.yuewen.com/484EEB/19470407201635606/epubprivate/OEBPS/Images/8c54bb5b-0460-4b29-abca-9d7b97527d8b.png?sign=1739527029-GKtWPK3yOncykilq12lGFbXidVYbwfLG-0-7d9011c8c61708c09437c8ebcd949d3a)
For more specific operators, we can refer to the guide from Google at http://www.googleguide.com/advanced_operators_reference.html, and well-known exploited Google dorks are available at https://www.exploit-db.com/google-hacking-database/.