fbpx

Investigating Google Docs & Email: An OSINT Tutorial

On the online platform, we frequently run upon publicly shared documents. The public is mostly unaware of the document’s data. Initial creation timeline, Last modification date and time, public rights, author’s name, email, and Google ID are among the unknown details. This information plays a vital role during OSINT investigations; in this OSINT tutorial,  we will learn about two different tools and fetch publicly available information about documents and Gmail accounts.

Xeuledoc Tool

Link to the tool https://github.com/Malfrats/xeuledoc

Xeuledoc Tool

Xeuledoc Installation

  • Clone the repository into the kali Linux desktop.
  • Change the directory and run the command for installing the requirements for the tool.

Xeuledoc Installation

Xeuledoc Google Docs OSINT Tutorial

  • Run the command with any public google doc.

Xeuledoc Google Docs OSINT Tutorial

  • Run the command with any public google presentation document.

Xeuledoc Google Docs OSINT Tutorial 2

GHunt Tool

Link to the tool https://github.com/mxrch/GHunt

GHunt is a modulable OSINT tool designed to evolve over the years and incorporates many techniques to investigate Google accounts or objects. It currently has email and document modules.

GHunt Tool

GHunt Tool 2GHunt Installation in Kali Linux

  • Clone the repository into the Kali Linux desktop.
  • Change the directory and run the command for installing the requirements for the tool.
  • Download the google chrome in Kali Linux and check the validity of cookies in a browser.
  • run check_and_gen.py to check the cookies.

GHunt Installation in Kali Linux

Ghunt Tutorial

  • Run the tool with any found email.

Ghunt Tutorial

  • Run the tool with a different email. And you can see the YouTube channels linked to email and find the location of the victim’s email.

Ghunt Tutorial 2Ghunt Tutorial 3

Sana Qazi
Sana Qazi is a technical writer specialized in Information Security. She enjoys writing about technology and reading multiple genres like suspense. When not writing, she can be found traveling, dinning out, watching series etc. She manages her medium blog as well.

Most Popular

Why Is Mobile App Hacking Growing In Popularity?

A cybersecurity blog post released by Varonis in March 2021 revealed the shocking truth:  Because of the Covid-19 pandemic, a huge increase in breached...

Protecting Your ID Online in 2021

With recent large hacks and increasing sophisticated schemes, we should also be protecting ourselves with even more sophisticated defensive strategies to protect our identities...

Taking a Look at the Privacy Features of Monero

Many large cryptocurrencies available today market themselves as bastions of business transparency by making their transaction data pseudonymously available on immutable, public databases. Because...

Best Tips on Cybersecurity for Students

Students, teachers, and educational institutions can all be targeted by hackers. In fact, 87% of schools have experienced one or more successful cyberattacks. There is...