Curating Content To Support Learning About Humanity's Transition

This content was posted on  18 Sep 24  by   Neurohacker Collective  on  Medium
OhSINT TryHackMe Writeup
task file

This TryHackMe room demonstrates how easy it is to extract identifiable information from a single photo, showcasing the power of Open Source Intelligence.

1. What is this user’s avatar of?

For the first step, I used ExifTool to extract the metadata from the image file attached to the room. By examining this metadata, I found a username in the copyright field: OWoodflint.

Exiftool Output

I then searched Google for this username and discovered several platforms where this user has an account. The first result shows the user’s avatar.

Answer: Cat

2. What city is this person in?

The answer to this question can be found in the GitHub result. Clicking on this repository link will reveal the user’s city.

Answer: London

3. What is the SSID of the WAP he connected to?

Going back to the X account, one of the posts contains the user’s BSSID which can be used to find their SSID

I entered the BSSID into Wigle.net and set the location to London which revealed the SSID

(You may need to sign up to use the search feature)

Answer: UnileverWiFi

4. What is his personal email address?

The personal email address can be found in the GitHub repository discovered earlier.

Answer: OWoodflint@gmail.com

5. What site did you find his email address on?

Answer: GitHub

6. Where has he gone on holiday?

To find out where he has gone on holiday, I checked the WordPress link in the GitHub Repository.

Answer: New York

7. What is the person’s password?

The password can also be found on the WordPress page.

Answer: pennYDr0pper.!


Tagged with :

Scroll to Top