fbpx

Investigating Google Docs & Email: An OSINT Tutorial

On the online platform, we frequently run upon publicly shared documents. The public is mostly unaware of the document’s data. Initial creation timeline, Last modification date and time, public rights, author’s name, email, and Google ID are among the unknown details. This information plays a vital role during OSINT investigations; in this OSINT tutorial,  we will learn about two different tools and fetch publicly available information about documents and Gmail accounts.

Xeuledoc Tool

Link to the tool https://github.com/Malfrats/xeuledoc

Xeuledoc Tool

Xeuledoc Installation

  • Clone the repository into the kali Linux desktop.
  • Change the directory and run the command for installing the requirements for the tool.

Xeuledoc Installation

Xeuledoc Google Docs OSINT Tutorial

  • Run the command with any public google doc.

Xeuledoc Google Docs OSINT Tutorial

  • Run the command with any public google presentation document.

Xeuledoc Google Docs OSINT Tutorial 2

GHunt Tool

Link to the tool https://github.com/mxrch/GHunt

GHunt is a modulable OSINT tool designed to evolve over the years and incorporates many techniques to investigate Google accounts or objects. It currently has email and document modules.

GHunt Tool

GHunt Tool 2GHunt Installation in Kali Linux

  • Clone the repository into the Kali Linux desktop.
  • Change the directory and run the command for installing the requirements for the tool.
  • Download the google chrome in Kali Linux and check the validity of cookies in a browser.
  • run check_and_gen.py to check the cookies.

GHunt Installation in Kali Linux

Ghunt Tutorial

  • Run the tool with any found email.

Ghunt Tutorial

  • Run the tool with a different email. And you can see the YouTube channels linked to email and find the location of the victim’s email.

Ghunt Tutorial 2Ghunt Tutorial 3

Sana Qazi
Sana Qazi is a technical writer specialized in Information Security. She enjoys writing about technology and reading multiple genres like suspense. When not writing, she can be found traveling, dinning out, watching series etc. She manages her medium blog as well.

Most Popular

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...

Cyber Physical Systems for Smart Grid Applications

The smart grid is an emerging paradigm for more reliable and efficient power delivery. It requires monitoring, controlling, and managing the power grid in...

How Is Hospital Critical Infrastructure Protected?

Hospitals hold a lot of sensitive data. When they are hacked, patient information is exposed, putting patients at risk because the hackers can use...

Software Engineering for Cyber-Physical Systems

Cyber-physical systems (CPS) are engineered systems that integrate computation, networking, and physical process. CPS classifies in many ways, including their scale, embeddedness, and the...