A little secret to rock your YouTube subscribers
Get Free YouTube Subscribers, Views and Likes

How to Approach an OSINT Challenge - 'Photographs' [INTIGRITI 1337UP LIVE CTF 2023]

Follow
CryptoCat

Video walkthrough for "Photographs", an opensource intelligence (OSINT) challenge from the ‪@intigriti‬ 1337UP LIVE CTF 2023. The challenge required players to examine exifdata and then trace back through alt accounts created by the target, exploring social media accounts uncovered using sherlock (and Google), reverse image searching etc. They would eventually find an interesting comment on a blog indicating location data was shared. This was a hint that players need to check the waybackmachine for an archived copy of the page, which contained the flag! Writeups/tutorials aimed at beginners Hope you enjoy #INTIGRITI #CTF #OSINT

↢Social Media↣
Twitter:   / _cryptocat  
GitHub: https://github.com/CryptoCat/CTF
HackTheBox: https://app.hackthebox.eu/profile/11897
LinkedIn:   / cryptocat  
Reddit:   / _cryptocat23  
YouTube:    / cryptocat23  
Twitch:   / cryptocat23  

↢INTIGRITI 1337UPLIVE CTF↣
https://ctftime.org/event/2134
https://ctf.intigriti.io
https://go.intigriti.com/discord

↢Resources↣
https://github.com/CryptoCat/CTF#readme

↢Chapters↣
0:00 Start
0:15 Explore website
0:31 Analyse image (strings / exif)
1:19 Search for username #1 on sherlock
2:14 Investigate social media (fl0pfl0p5)
4:31 Find another username on reddit
5:04 Search for username #2 on sherlock
5:26 Find image #2 on Twitter (m4r64r1n3)
5:46 Reverse image search (Google / Tineye)
6:54 Find & research username #3
7:13 Find a copy of image #2 on blogspot (v1ck1v4l3)
7:45 Check the waybackmachine for archived copy
8:29 End

posted by abiosi2p