On the online platform, we frequently run upon publicly shared documents. The public is mostly unaware of the document’s data. Initial creation timeline, Last modification date and time, public rights, author’s name, email, and Google ID are among the unknown details. This information plays a vital role during OSINT investigations; in this OSINT tutorial, we will learn about two different tools and fetch publicly available information about documents and Gmail accounts.
Table of Contents
Xeuledoc Tool
Link to the tool https://github.com/Malfrats/xeuledoc
Xeuledoc Installation
- Clone the repository into the kali Linux desktop.
- Change the directory and run the command for installing the requirements for the tool.
Xeuledoc Google Docs OSINT Tutorial
- Run the command with any public google doc.
- Run the command with any public google presentation document.
GHunt Tool
Link to the tool https://github.com/mxrch/GHunt
GHunt is a modulable OSINT tool designed to evolve over the years and incorporates many techniques to investigate Google accounts or objects. It currently has email and document modules.
GHunt Installation in Kali Linux
- Clone the repository into the Kali Linux desktop.
- Change the directory and run the command for installing the requirements for the tool.
- Download the google chrome in Kali Linux and check the validity of cookies in a browser.
- run check_and_gen.py to check the cookies.
Ghunt Tutorial
- Run the tool with any found email.
- Run the tool with a different email. And you can see the YouTube channels linked to email and find the location of the victim’s email.