![Mastering Kali Linux for Advanced Penetration Testing(Second Edition)](https://wfqqreader-1252317822.image.myqcloud.com/cover/17/36701017/b_36701017.jpg)
Using dork script to query Google
The first step for testers to understand Google Hacking Database is to understand all the advanced Google operators, just as the machine-level programming engineers must understand computer OP codes. These Google operators are part of the Google query; the syntax of searching is as follows:
Operator:itemthatyouwanttosearch
There is no space between the operation, the colon, and itemsthatyouwanttosearch. The following table lists all the advanced Google operators:
![](https://epubservercos.yuewen.com/484EEB/19470407201635606/epubprivate/OEBPS/Images/2.jpg?sign=1739286672-RTz7vMAxS4QoSAMcZoAm4WThnfdUeXYL-0-838ed2b0213964e2e06dc70200a67ac1)
The following screenshot provides a simple Google dork to search for username in a log file.
The dork search is allintext:username filetype:log:
![](https://epubservercos.yuewen.com/484EEB/19470407201635606/epubprivate/OEBPS/Images/8c54bb5b-0460-4b29-abca-9d7b97527d8b.png?sign=1739286672-0A7kOdnAFPRQzyyFFeZOjcM5UWoRIQGE-0-fc7c45c7026f1992be93d6ed6f348678)
For more specific operators, we can refer to the guide from Google at http://www.googleguide.com/advanced_operators_reference.html, and well-known exploited Google dorks are available at https://www.exploit-db.com/google-hacking-database/.