An Uncommon OSINT way to Juicy Files
OSINT via URL Shortener Service(s) and Public Google Docs
Last updated
Was this helpful?
OSINT via URL Shortener Service(s) and Public Google Docs
Last updated
Was this helpful?
One of the most important parts of pentesting & bug bounty process is to perform a solid OSINT phase. In this article, I will be covering an uncommon OSINT technique that let me find a few juicy files with confidential information in them. The following keywords are the main topics of this article: URL Shortener Services, Google Docs
URL Shortener Services
Url shortener services are SaaS services that are used for creating short URLs that redirect you to long complex ones. Mostly they are used for cosmetic purposes and readability. A few examples of shortened urls can be found below:
bit.ly/{urlcode} goo.gl/{urlcode}
The problem starts when people start to use URL Shortener services with secret links such as Google documents with credentials or confidential financial data. As it sounds, if we can find which shortened URL is pointing to a potentially confidential document we can achieve our goal. But of course, in order to detect such links, we need to have a list of shortened URLs. Additional to that, even if we have a list of shortened URLs, there could be thousands of documents, so we need to find a way to filter out the results. So let's dive the challenges into the pieces.
Challenge #1: Getting a List of Shortened URLs
As it sounds, URL shortener services generate really short nice looking URLs. This means that, as long as we know which URL shortener service we want to target, a brute-force attack can be conducted against {urlcode} part to detect if the links are valid. Luckily, there is already a tool that publicly exists and performing the same plan against the most common URL shortener services for years. That tool is from an amazing team A.K.A .
Solution #1
https://tracker.archiveteam.org:1338/status
By using the power of urlhunter and URLteam we can retrieve a list of Google Doc URLs from URL shortener services.
As a result of the scan above, 50249 Google doc links have been found from Shortened URLs. The second challenge is, how to detect which links from the list have specific keywords in them according to our interests.
Challenge #2: Detecting URLs with Specific Keywords
In order to solve this challenge, I've written a simple python script that sends an HTTP request to the links and checks keywords in response messages.
Solution #2
Results
By combining the urlhunter and the script I've written, I was able to find a lot of google docs with passwords in them.
Moreover, for the sake of further automation, there is a tool that exists on GitHub called that retrieves data from URL Team. can be used for detecting long versions of URLs with specific keywords from ' archives.