CIP Cyber

Investigating Google Docs & Email: An OSINT Tutorial

Table of Contents

On the online platform, we frequently run upon publicly shared documents. The public is mostly unaware of the document’s data. Initial creation timeline, Last modification date and time, public rights, author’s name, email, and Google ID are among the unknown details. This information plays a vital role during OSINT investigations; in this OSINT tutorial,  we will learn about two different tools and fetch publicly available information about documents and Gmail accounts.

Xeuledoc Tool

Link to the tool https://github.com/Malfrats/xeuledoc

Xeuledoc Tool

Xeuledoc Installation

  • Clone the repository into the kali Linux desktop.
  • Change the directory and run the command for installing the requirements for the tool.

Xeuledoc Installation

Xeuledoc Google Docs OSINT Tutorial

  • Run the command with any public google doc.

Xeuledoc Google Docs OSINT Tutorial

  • Run the command with any public google presentation document.

Xeuledoc Google Docs OSINT Tutorial 2

GHunt Tool

Link to the tool https://github.com/mxrch/GHunt

GHunt is a modulable OSINT tool designed to evolve over the years and incorporates many techniques to investigate Google accounts or objects. It currently has email and document modules.

GHunt Tool

GHunt Tool 2GHunt Installation in Kali Linux

  • Clone the repository into the Kali Linux desktop.
  • Change the directory and run the command for installing the requirements for the tool.
  • Download the google chrome in Kali Linux and check the validity of cookies in a browser.
  • run check_and_gen.py to check the cookies.

GHunt Installation in Kali Linux

Ghunt Tutorial

  • Run the tool with any found email.

Ghunt Tutorial

  • Run the tool with a different email. And you can see the YouTube channels linked to email and find the location of the victim’s email.

Ghunt Tutorial 2Ghunt Tutorial 3

SanaQazi

SanaQazi

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

Best Practices for Open Source Security

Introduction The use of open-source code has been increasing since developers generally use community-built code according to the application functionality and use content-security policies and

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings