This is the finale of this series for now (in retrospect, we cover a lot more in depth on image intelligence than any other type of intelligence in this series so in the future if I can found a different type of intel room, I will post em’ as bonus article in this series)
Here is the link to the challenge if you want to try em’ out:
SoMeSINT is Social Media Intelligence/Investigation which basically advanced search for social media platforms (and tools used to do that)
So, let us jump to the writeup
Task 1: Overview
this part just give general overview of the room, some prerequisite before you do this room and the flag format for this room.
Prerequisites:
- Critical Thinking.
- A love of going deep into rabbit-holes.
- Basic understanding of Google.(I think for this one, you need to finish the Google Dorking room first. Here’s the link for the room: https://tryhackme.com/room/googledorking)
- Python 3.7+(for this part, there are 2 option. Either you download the package here https://www.python.org/downloads/release/python-370/if you’re using a windows machine or if you’re using linux distro, use this guide instead: https://docs.python-guide.org/starting/install3/linux/)
Flag Format: ks{flag}. Just copy paste the flag into the curly brackets.
Oh and also the creator of this room links TryHackMe and Kaffeesec discord server for any help on this room:
Task 2: Story
Q1: Who hired you?
A1: ks{H}
Q2: Who are you investigating? (ks{firstname lastname})
A2: ks{Thomas Straussman}
Task 3: Let’s get started!!
Prerequisites:
- Patience, curiosity, and a passion for digging into rabbit holes.
- Firefox, Chrome, or another chromium-based browser (I recommend Brave).
The creator also highlights this specific alert on this room:
“ Before starting, I will preface this by saying the only places these accounts are found on are Twitter and Reddit. Please do not try to investigate further out-of-scope, as you will both meet a dead end and be snooping on accounts not involved with this CTF at all. I am not responsible for any actions/interactions made with an account outside of the sockpuppets created for this CTF. As a general rule, we’re collecting PASSIVE information — there’s no interacting directly with these accounts.”
So, no hacking. Just collect info.
As usual, we will start first with googling the targets name and see what shows up:
Q1:What is Thomas' favorite holiday?
You can see directly on the bio here :
A1: ks{Christmas}
Q2: What is Thomas’ birth date?
You can’t see this detail here on Twitter.. Let us go to reddit instead
A2: 12–20–1990
Q3: What is Thomas' fiancee's Twitter handle?
A3: ks{@FHodgelink}
Q4: What is Thomas' background picture of?
A4: ks{Buddha} You can clearly see the background pic in the header above.
Task 4: Spider…what?
Requirements:
- Spiderfoot (this is the guide to download spiderfoot if you use linux https://www.spiderfoot.net/documentation/#installing)
- Python 3 (I’ve given the guide to download this one on the intro)
Basically you need to follow the instruction on this task(to grossly simplify, after install python + spiderfoot you run spiderfoot on the terminal and also your browser.Then, you just scan em’ with the keyword given in the task)
Q1: What was the source module used to find these accounts?
A1: ks{sfp_accounts}
Q2: Check the shadowban API. What is the value of "search"?
So, we need to use help of previous writeup on this room:
Ok, so I need to open this link: https://shadowban.eu/.api/tstraussman on the same browser I open the spiderfoot. I have no idea how to look for this link…
A2: ks{1346173539712380929}
Task 5: Connections, connections..
Now in this task, we will do reverse search images.
For the last 3 rooms, I’ve focused on IMINT. And I think I would like to relink the Searchlight IMINT room writeup (if you want a complete dive into image intelligence):
But for this part, I will copy paste the software recommendation that I’ve done in the writeup:
There are 2 extension that I think will smoothen your process doing reverse image search
1) Fake news debunker by InVID & WeVerify (available on chrome and firefox only)
2) RevEye Reverse Image search extension (available on chrome, firefox and microsoft edge)
I think I will link these 2 articles to get the feel on how to use em:
1) https://datasociety.net/wp-content/uploads/2020/03/How-To-Verify-Online-Census-Media-final.pdf
Simply after you download the extension, right click and choose what you want.
Here are things you need to focus on while doing this reverse image search:
- Images of places that contain clear identifiers like buildings, signs, monuments, or landmarks (For IMINT/GEOMINT purposes).
- Clear images of the subject’s face (For reverse image searches and possibly finding more accounts/sources of info).
- Clear images of the subject in a group of people (Family photos, friend groups, other information that can give context to their relationship with the group).
- Personal information in their bio, or other personal data from their profile itself (Where they grew up, currently live, went to school, etc..).
- Relevant posts that may contain information on their whereabouts or personal habits (Do they smoke? Drink? Go to bars often? Love to vacation to specific places? All this information can help in an investigation.)
p/s: I am sorry for the long start for this task but these details are necessary for this task
Q1: Where did Thomas and his fiancee vacation to?
Suprisingly, Google wins this one.
A1: ks{Koblenz, Germany}
Q2:When is Francesca's Mother's birthday? (without the year)
A2:ks{December 25th} following the format in the hint:
Q3: What is the name of their cat?
A3: ks{Gotank}
Q4: What show does Francesca like to watch?
A4: ks{90 Day Fiance}
Task 6: Turn back the clock!!
For this one we need to use 2 stuff:
- Reddit in both style (old: http://old.reddit.com/ for wayback machine stuff and the regular reddit)
- WayBackMachine (this extension have on Firefox and Chrome)
After that, you right click the page, click Wayback Machine > All version
Q1: What is the name of Thomas' coworker?
A1: ks{Hans Minik}
Q2: Where does his coworker live?
A2: ks{Nuuk, Greenland}
Q3: What is the paste ID for the link we found?
So, we need to open the very first saved version of Han’s profile
A3: ks{ww4ju}
Q4: Password for the next link? (flag format)
A4: ks{1qaz2wsx}
Q5: What is the name of Thomas’ mistress?
For this one, we need to open the pastebin.
A5: ks{Emilia Moller}
Q6:What is Thomas' Email address?
Based on the two pastebin given above, we can conclude that the email is straussmanthom@mail.com
A6:ks{straussmanthom@mail.com}
Task 7: Resources
the room creator also links room and other CTF for y’all to try:
for Searchligh IMINT, I have done the writeup on that room here:
Well, this is it. The finale of the TryHackMe series for now.
These 4 room I extensively focus on IMINT part of OSINT(even this room also need to use reverse image search, I can’t escape it)
I think that all for now. Reach me on twitter (@thisisfinx) if there’s error in this article or things that I miss.