Investigating Google Docs & Email: An OSINT Tutorial

On the online platform, we frequently run upon publicly shared documents. The public is mostly unaware of the document’s data. Initial creation timeline, Last modification date and time, public rights, author’s name, email, and Google ID are among the unknown details. This information plays a vital role during OSINT investigations; in this OSINT tutorial,  we will learn about two different tools and fetch publicly available information about documents and Gmail accounts.

Xeuledoc Tool

Link to the tool https://github.com/Malfrats/xeuledoc

Xeuledoc Tool

Xeuledoc Installation

  • Clone the repository into the kali Linux desktop.
  • Change the directory and run the command for installing the requirements for the tool.

Xeuledoc Installation

Xeuledoc Google Docs OSINT Tutorial

  • Run the command with any public google doc.

Xeuledoc Google Docs OSINT Tutorial

  • Run the command with any public google presentation document.

Xeuledoc Google Docs OSINT Tutorial 2

GHunt Tool

Link to the tool https://github.com/mxrch/GHunt

GHunt is a modulable OSINT tool designed to evolve over the years and incorporates many techniques to investigate Google accounts or objects. It currently has email and document modules.

GHunt Tool

GHunt Tool 2GHunt Installation in Kali Linux

  • Clone the repository into the Kali Linux desktop.
  • Change the directory and run the command for installing the requirements for the tool.
  • Download the google chrome in Kali Linux and check the validity of cookies in a browser.
  • run check_and_gen.py to check the cookies.

GHunt Installation in Kali Linux

Ghunt Tutorial

  • Run the tool with any found email.

Ghunt Tutorial

  • Run the tool with a different email. And you can see the YouTube channels linked to email and find the location of the victim’s email.

Ghunt Tutorial 2Ghunt Tutorial 3

Sana Qazi
Sana Qazi is a technical writer specialized in Information Security. She enjoys writing about technology and reading multiple genres like suspense. When not writing, she can be found traveling, dinning out, watching series etc. She manages her medium blog as well.

Most Popular

Why You Need a Disaster Recovery Plan (DRP)

Although an apocalyptic IT network disaster may be unthinkable, a company should plan for its eventual occurrence and remediation. Sooner or later, catastrophe will...

Access Target’s Webcam, Microphone, Device location, and more

Cybercriminals and black hat hackers exploit system vulnerabilities and human weaknesses as well. This hacking tutorial discusses how a malicious actor can access any...

The Benefits of Automated Penetration Testing

Penetration testing has been one of the industries that are relatively slow adopters of automation. As security firms started automating many parts of the...

Wii Features That We Loved The Most and Would Like to See on Other Consoles

The Wii was released in the US on November 19, 2006, for $249 and is the smallest of the 7th generation consoles. Its dimensions...