Theresa Ekong’s Post

View profile for Theresa Ekong, graphic

Social Media Manager at Hacktales Limited | Cybersecurity Analyst

Hi everyone, I just completed my first ever OhSINT room on TryHackMe. Here’s how I tackled it: I was given a picture and had to extract various pieces of information, such as: - The owner's avatar - Their email address - Their city of residence - Where they were on holiday - The SSID of the WiFi access point they were connected to - The site where their email address was found - Their password First, I downloaded the picture to my Linux machine. Using Exiftool, I determined the copyright owner of the picture. With the owner's name, I gathered more information, such as their X handle (formerly Twitter) and their blog. Here’s a detailed breakdown: Avatar: The owner had a picture of a cat as their profile picture on their X account. Email Address: This was easy to find as it was listed on their GitHub account. City of Residence: I could determine this in two ways; using the geolocation data which was provided by Exiftool or the BSSID which was posted by the owner on X. in this case I used the BSSID on Wigle.net, I found his location to be London. SSID: This information was also provided by Wigle.net after my search. Site of Email: The email address was found on GitHub as mentioned earlier Password: This was tricky. PS: never store your passwords in your source code! That’s how I found the owner's password. This was a super fun exercise, and I learned a lot from going through this room.

OhSINT

OhSINT

tryhackme.com

To view or add a comment, sign in

Explore topics