404 words
2 minutes
OhSINT TryHackMe Write UP

In this challenge, we are given an image and asked to use OSINT techniques to answer a set of questions.

At the beginning of the challenge, we were given an image file.
Since this is an OSINT challenge, the first logical step is to check if the image contains hidden metadata.

We used the tool exiftool to extract EXIF information from the image.

exiftool WindowsXP_1551719014755.jpg

Important Findings#

While reviewing the output, some information immediately caught our attention :

The image contains GPS data :

Latitude: 54° 17’ 41.27” N
Longitude: 2° 15’ 1.33” W

This means the photo was taken at a specific real world location, which is very useful in OSINT investigations

Another interesting field was :

Copyright : OWoodflint

This looks like a username or real name and it can be used as a pivot for further OSINT searches on Google , Social media platforms , Image search
, Username enumeration

To continue the investigation, we searched for the name OWoodflint using google

As a first step in the search , I found an X (Twitter) account related to the target

Q1 : What is this user’s avatar of ?

Answer : cat

I also found a GitHub repository using the same username

Q2 : What city is this person in?

Answer : London

Q4 : What is his personal email address?

Answer : OWoodflint@gmail.com

Q5 : What site did you find his email address on?

Answer : github

The target leaked their Wi-Fi BSSID on Twitter. I used this BSSID on Wigle.net by performing an advanced search. After entering the BSSID Wigle returned the network information

Q3 : What is the SSID of the WAP he connected to?

Answer : UnileverWifi

In the previously discovered repository, we found a link to the target’s personal webpage. I visited the page, as shown in the screenshot below

We determined that the target is currently located in New York

Q6 : Where has he gone on holiday?

Answer : New York

As mentioned in the TryHackMe question about the password of user, many people whether developers or regular users often make critical security mistakes by leaving sensitive information such as passwords inside code comments

I performed a thorough review of the source code, and after careful inspection, I was able to discover the target’s password

Q7 : What is the person’s password?

Answer : pennYDr0pper.!

We successfully completed the challenge. I hope you enjoyed it as much as I did it was simple and enjoyable. See you in future challenges

This challenge shows how small mistakes in online presence can lead to serious information leaks. Simple actions like reusing usernames, leaking Wi-Fi data, or leaving sensitive information in code can expose more than expected. Always review what you share publicly and follow basic security hygiene