У нас вы можете посмотреть бесплатно How to Approach an OSINT Challenge - "Photographs" [INTIGRITI 1337UP LIVE CTF 2023] или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Video walkthrough for "Photographs", an opensource intelligence (OSINT) challenge from the @intigriti 1337UP LIVE CTF 2023. The challenge required players to examine exifdata and then trace back through alt accounts created by the target, exploring social media accounts uncovered using sherlock (and Google), reverse image searching etc. They would eventually find an interesting comment on a blog indicating location data was shared. This was a hint that players need to check the waybackmachine for an archived copy of the page, which contained the flag! Write-ups/tutorials aimed at beginners - Hope you enjoy 🙂 #INTIGRITI #CTF #OSINT Write-up: https://book.cryptocat.me/ctf-writeup... ↢INTIGRITI 1337UPLIVE CTF↣ https://ctftime.org/event/2134 https://ctf.intigriti.io https://go.intigriti.com/discord 👷♂️Resources🛠 https://cryptocat.me/resources ↢Chapters↣ 0:00 Start 0:15 Explore website 0:31 Analyse image (strings / exif) 1:19 Search for username #1 on sherlock 2:14 Investigate social media (fl0pfl0p5) 4:31 Find another username on reddit 5:04 Search for username #2 on sherlock 5:26 Find image #2 on Twitter (m4r64r1n3) 5:46 Reverse image search (Google / Tineye) 6:54 Find & research username #3 7:13 Find a copy of image #2 on blogspot (v1ck1v4l3) 7:45 Check the waybackmachine for archived copy 8:29 End