This challenge consist of 3 type of OSINT. What are some we call "espionage".
These are the type of gathering we need to find out:
Social Media/ Social Network
- Gathering social media platform that target have
Language used
- Later in this article, you would learn I mean by language
BONUS!! (Shhh! DON'T SKIP TO BONUS! READ FIRST, OK?)
I actually didn't check the URL on my phone while doing this.
Once I get to use my laptop, then I see this long
URL sitting above me..
It hurts me so much..
Look Around Your Screen
As you look at the URL link on my left (I know not full. But here's this link if ALT didn't work: https://b.0-0.plus/blog/md.htm?src=https://raw.githubusercontent.com/johndover-hajtech/johndover-hajtech/main/README.md).
You can see that this web page is embedded ontop of github plaintext file (README.md).
As you can read more into it. It looks like the source file is from "github" (https://raw.githubusercontent.com/). This URL could be an API that the website is embedding.
We are more interested what is after that, "johndover-hajtech".
Look like an github user.
Sometime, we need to always look what we have first. In this case, we don't find anything very useful about the content of the webpage, but the URL has given us a good clue about who is our target.
MISPLACED ASSETS
(Github ASSETzz)
As you can see at the three picture on your right.
These are some assets I could gather from one of the repository called "pyotp".
Looks like our target deleted all the repo files. But the only problem is "commit". Such a snitch that I was able to recover the previous changes.
As you can see that we have found out that these were related to an password. But we don't know which password, until our target decided to change that line to: picture 3. (Look at picture 3 to see line 5 changes: "totp = pyotp.TOTP(os.environ['OTP_SECRET'])").
The password potentially be a google account cridential.
Sometime, when we're doing this challenges, we might need to see the assets on what our target has. (assets in cybersecurity are like your kopi money, but inside the digital world. Think of it as if is a books, phone, and cash, but inside your computer screen. It's stuff you value online, like files and secret codes)
In this case, our first asset + a clue to a flag is at github.
Espianoge Da Hunter
(This is the part where you're gonna learn how to stalk people online.
But, in this educational write-up purposes. I'm gonna stalk this challenge to find the other part of the assets.)
As you can see all these images. I spend about 3 hours to find our target social media by going through some well-kown social media platform. I found our target instagram and few more information outside of this display image (Unfortunately, I'm not confirm that all those social media platform I gather are the accounts that we're looking for).
tip:
In most cases, using a technique called "dorking" will help you get most of your target social media accounts and assets. Because of it's being publically aviliable on the internet, we could take it as an advantage to find out more about our target.
Sometime it's not easy to directly dork our target. So, by using an AI such as osintframework (a large framework of OSINT tooklit and AI that helps with investigation) and Exploit Database (Exploit-DB) would be useful at this point (But make sure you know what you're finding for).
Check what you have gathered about the target such as their name, address, phone number or anything that came pretty handy for espianoge challenges or even at work.
MISPLACED ASSETS
(Social media/Social network ASSETzzzzz)
As you can see the image on your left.
It looks like an Instagram account that our target uses (I was checking with a search engine, but couldn't find any).
And as you can see, there's a post on this account. I couldn't tell if this is the account we're looking for, so, I click on the post. And sure enough it's the account we're looking for.
And by the looks of it it seems to be a clue for the password. But what do it means "leet speak"??
So, I google out and found out it's a type of charecters that made into a word with symbolize letter and a plaintext letter (symbolize letter: [1,2,3,4,5,6,7,8,9 and 0] and [! , @ , # , $ , % , ^ , & , * , ( , ) , _ , ~ and ?] and plaintext letter: [a, b, c, d, e, f, g and so on] ).
Piece the information together
As you can see the first image.
I write a simple python script to generate me a possibility of the clues that I had gather previously.
While I was writting this python script with pyleetspeak, I ran into alot of problem. Looks like the library is spoilt.
So, I used flag-gen as an alternative to pyleetspeak.
As you can see the second image. I add a little modification to the script to detect if there's any replicated string being parse into the output. So, instead of try to eliminate manually, why don't we add another lines to let python automate the whole job to simplified our job. So, I added variable "unique" to actually recycle the strings that's being parsed during the output.