fbpx

Investigating Google Docs & Email: An OSINT Tutorial

On the online platform, we frequently run upon publicly shared documents. The public is mostly unaware of the document’s data. Initial creation timeline, Last modification date and time, public rights, author’s name, email, and Google ID are among the unknown details. This information plays a vital role during OSINT investigations; in this OSINT tutorial,  we will learn about two different tools and fetch publicly available information about documents and Gmail accounts.

Xeuledoc Tool

Link to the tool https://github.com/Malfrats/xeuledoc

Xeuledoc Tool

Xeuledoc Installation

  • Clone the repository into the kali Linux desktop.
  • Change the directory and run the command for installing the requirements for the tool.

Xeuledoc Installation

Xeuledoc Google Docs OSINT Tutorial

  • Run the command with any public google doc.

Xeuledoc Google Docs OSINT Tutorial

  • Run the command with any public google presentation document.

Xeuledoc Google Docs OSINT Tutorial 2

GHunt Tool

Link to the tool https://github.com/mxrch/GHunt

GHunt is a modulable OSINT tool designed to evolve over the years and incorporates many techniques to investigate Google accounts or objects. It currently has email and document modules.

GHunt Tool

GHunt Tool 2GHunt Installation in Kali Linux

  • Clone the repository into the Kali Linux desktop.
  • Change the directory and run the command for installing the requirements for the tool.
  • Download the google chrome in Kali Linux and check the validity of cookies in a browser.
  • run check_and_gen.py to check the cookies.

GHunt Installation in Kali Linux

Ghunt Tutorial

  • Run the tool with any found email.

Ghunt Tutorial

  • Run the tool with a different email. And you can see the YouTube channels linked to email and find the location of the victim’s email.

Ghunt Tutorial 2Ghunt Tutorial 3

Sana Qazi
Sana Qazi is a technical writer specialized in Information Security. She enjoys writing about technology and reading multiple genres like suspense. When not writing, she can be found traveling, dinning out, watching series etc. She manages her medium blog as well.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...