OSINT

Farewell


For this challenge, we got a farewell letter for Nur Syahirah. In that letter we see there is a number from her secret admire. Lets we stalk the number.

To stalk the number first, we will download Getcontact app from the Playstore or Appstore. After that, we need to insert the number we want to search. For this case we will insert the secret admire number which is "+601136740073".

After we search that number we found that number is under a name 'Hamizan Azmi'.

Then after that, we touch the tag area and scroll down a little bit and found the flag.
EG{g3t_3xpOs3d}
Broken Man


Next challenge is Broken Man. With hint given in this challenge which is "@theniceguy4485 1 year ago". We need to go to the YouTube and find the video with exact duration which is 3:29.

For those who don't know who is he, you guys can use reverse search which using image search by google image. It will show the result "peaky blinders zaten kirik". Then, after that all we need to do is to search on YouTube.

This video duration look same with challenge image.

After scroll down a little bit at comment section we found that there is username "the nice guy" 1 year ago. It looks the same as the hint given by the challenge. Let's take a look at the replied comment under this username.

After scrolling at replied comment section we found Base64 encoded which is could be our flag. Let's decode it using online tools at Google. Just search "base64 decoder"

After we decode it using online tools, then we got the flag.
EG{K33P_GR1ND1NG}
Octopus


Next challenge is Octopus. We have been given this image named "code.jpg". First lets try do reverse search using google image.

After doing reverse search, we found that this image is related to GitHub. So maybe we need to find a GitHub account. But how are we going to find it? Let's check the hex for this image, maybe we find something.

To check hex for an image, you guys can use software like HeX editor for windows. But in this case I'm using bless which is one of the hex editor for Kali Linux. To run bless tools, just simply type "bless <image name file>.

From here, we will inspect the header and footer of the image. It is because usually hidden message or code will be hiding at those sections. After scrolling down at footer images, I found there is base64 encode. At first, I thought it was a flag, but it's not.

After decode the base64, it gives this. For a while I was like 'huh??' but after remember at the first information we get which is GitHub account so this is may the GitHub account we need to find.

After randomly search '0hanif0' I found a link call raw.githubusercontent.com. This link list, a lot of GitHub user account. Then I try to search an account 0hanif0 and i found the link account. Then let's go through that account.

After stalking a little bit at this GitHub account, I found a repo "0hanif0/EGCTF2023". It is similar with decoded base64. Let's take a look at this repo.

After click that repo, found a new folder, then i click the new folder then it come out new folder again.hahaha... you need to click the new folder until found upside down flag. Really test my patience this challenge.
EG{G1THUB_15_FUN}
Oldest Historical Tree


Next challenge is the oldest historical tree. This challenge give you an image name memories.jpg. Let's try to do reverse search.

Reverse search didn't do anything. Then let's manual search. https://www.caridestinasi.com/tempat-menarik-ipoh/. With the link given by the challenge, I try to google one by one until this one place which KTM Ipoh. After search it in Google Maps, I found a near place named Dataran KTM Ipoh. The map pattern looks familiar to the Pokémon Go map.
After click at the pinpoint and look at the map image on latest section, I found this. This challenge creator is Xion nice challenge by the way. There is a Facebook link at the image. let's go the Facebook page.

That Facebook link redirect us to the eliteghost Facebook pages. After we see a comment at recent post, you found a Pikachu Facebook account.

Then after we're stalking Pikachu account, we found this at Pikachu post. You can found this comment at one of the Pikachu post. After inspect a little bit at the photo, you can found a sentence at left corner of tree image.


This could be our flag. This sentence is written using Old Krytan, let's translate it. Let's decode it by search Old Krytan. By using that image, manage to extract the flag.
EG{L0T5_0F_M3M0R135}
Thirsty


In this challenge we are given 3 files which are Menu.zip, Place.zip and Pokémon.jpg. From the info we get from the challenge:
Pikachu is at Ipoh
Saw Starbucks store
Pikachu love frappucinos.

From that info, I search startbuck near Ipoh at Google map. let's take a look one by one and compare the map pattern with Pokémon Go pattern.

After a few searches, I found that Starbucks Medan Gopeng map pattern is quite the same with Pokémon Go pattern. i take a look at review section and image nothing found. Stuck a while.

After that try unlock the zip file Places with Starbuck Medan Gopeng and its work. Then we stalk the IG account by search it at like in eliteghostm post.

After that, found an account with a same profile picture, then found this. this could be a password for other file. Lets try it.





Yes it works. After unzip the menu.zip, it gives us this file. It was a book chiper. In order to get the message in book chiper let's do it with this tool https://www.boxentriq.com/code-breaking/book-cipher. We just need to copy the lyric in Book text section, then fill the codes section. After that you need to setting the line number, word number and character number. After that we get the flag.
EG{REST_WITH_COFFEE}
SixSenses


Next challenge is sixsense. In this challenge, they're given PNG file. It looks like that in PNG file. It was hand sign language. We can decode it using this link, https://www.dcode.fr/american-sign-language. After decode it, it gives us a link which is https://eliteghost.tech/lalala.mp3. After hearing that song, i heard it say something like this, "Ai_man...EG.....follower". Then after that I try to find username aiman in IG eliteghost Malaysia.

After stalking eliteghost follower, I found this account that related to aiman. aimantinoo22.

After look at first post image and caption. I found "R4" in the picture and a "+++" language. After a little research, it was a brainfuck language. Let's decode it using dcode.fr. after decode it, it shows like this:...it could be a part of the flag. Let's take a look at the second post.
R4R3}

Nothing special at second post, but the caption is look like the half flag. Next let's take a look at highlight.
_S3NS3

At this highlight story I found this, it may lead to the flag. After go around into aimontino22 account, I forgot to stalk his follower.

After stalking into aimantinoo22 follower, I found this account. Looks at the highlight story.

Found a tongue picture that have symbol. We need to decrypt it again.

After a little research, it was an Ancient Egypt hieroglyphs. So we need to decode it according to the symbol. After we decrypt it came out to this
IS_SO
After combine, it according to the highlight story in aimantinoo22 ig, we get the flag.
EG{S1X_S3NS3_IS_SO_R4R3}
Last updated