GHunt OSINT tool helps pen-testers in threat hunting


    A new open-source tool GHunt allows security teams to explore data created by Google accounts. The tool was developed by Thomas Hertzog. GHunt lets individuals, or security experts, analyze a target’s Google “footprint” based just on an email. This open-source intelligence tool can extract the account owner’s name and Google ID, YouTube channel, and active Google services, including Photos and Maps. It can also reveal public photos, phone models, make, firmware, and installed software, and potentially, the user’s physical location.

    Hertzog said, “GHunt is for people curious about the public information generated by their Google activity and what an attacker might extract from it, or people using OSINT in their work, such as in threat hunting. It can be used by white hat and pen testers to test if emails found during a pen test are sensible and can leak other information, but can also be used in threat hunting to identify and track down threats”

    GHunt is one of a growing number of tools that use open-source information to compile data about online users’ identities and activities. Often, the target subjects are unaware of just how much data is available. Although the tool works through free Gmail addresses, Hertzog believes this can still cause issues for businesses, including G Suite (now Google Workspace) users, where employees have used a free address to register for services. 

    “This tool demonstrates the amount and type of information which can be gained from a Google account email address through public interrogation of Google,” said Stuart Morgan, security consultant at F-Secure.

    As an OSINT tool, GHunt could be used for both threat intelligence gathering, and attack simulation and Hertzog plans to continue to further develop the tool, including gathering more information on phone models used with Google accounts and to probe deeper into Google services, including Maps and Picasa.

    Recent Articles

    Related Stories