TryHackMe: OSINT Challenge

Write Up of TryHackMe’s OSINT Challenge, tracing a digital footprint using real-world OSINT techniques.

🇧🇷 Ler em Português.

This is a complete walkthrough of the OSINT Challenge hosted on TryHackMe, a popular cybersecurity learning platform. This open-source intelligence (OSINT) room challenges users to trace a fictional character’s digital footprint, starting from a single image.

Throughout the challenge, you'll extract metadata, perform reverse image searches, investigate social media activity, and explore GitHub repositories to uncover hidden flags—one of which is cleverly embedded in an interactive element on a personal blog. Perfect for cybersecurity newbies and digital investigators, this hands-on Capture The Flag (CTF) provides OSINT training using real-world techniques.

Whether you're preparing for a cybersecurity career, studying for OSINT certifications, or just love solving online puzzles, this room is a great way to boost your reconnaissance skills and learn how to track someone online using only publicly available data.

👉 https://tryhackme.com/room/desafioosint

The challenge starts with an image. Your mission: extract metadata and find clues that reveal the photo's location.



Questions
Q1. What is the username?
Q2. What is the User’s full name?
Q3. Where was the photo taken?

To retrieve image metadata, you can use various online EXIF viewers. On Linux systems, the exiftool command is ideal:

exiftool <filename>

If it's not installed, run:

sudo apt install exiftool

☝️🤓 For other platforms, follow the Installation Guide.



By continuing to analyze the metadata, you’ll uncover the user’s real name. Always look carefully at fields like Author, Artist, Creator, Copyright and Owner:



Drop the image on Google:



🇧🇷 This challenge is in Portuguese, so remember to translate and interpret clues accordingly.

Now that you have the username and full name, start your social media investigation. Use platforms like Facebook, Instagram, X (Twitter), and LinkedIn to track down personal details.

Questions
Q1. What is the user’s city of birth?
Q2. Where was the user on May 13, 2024?
Q3. What is the user’s email?

Look at the user’s public profiles. Facebook and LinkedIn often contain biographical details like the city of birth or hometown.




☝️🤓 Again: This challenge is in Portuguese, so remember to translate and interpret clues accordingly.

Scroll through social media posts and geotagged photos. Users often share travel details or check-ins that reveal their location.




GitHub can be a goldmine for OSINT. Check commits and profile settings to uncover the user’s email address.



Now that you have several user data, look for the first flag.

Question
Q1. What flag is found in the repository?

Now that we’ve gathered some personal data, the first flag is hidden inside a GitHub repository. Look for a repo named "cssdc", as referenced in the challenge description.





Continue collecting more data from the user and find the last flag on the user's personal page.

Questions
Q1. What is the user’s blog address?
Q2. Which database does the website use?
Q3. Search for the Flag on the Website.

Most GitHub profiles include personal websites or blogs in the bio section. You’ll find the link easily.



Use tools like Wappalyzer to analyze the site’s backend technologies.

☝️🤓 Install Wappalyzer as a browser extension.



Click around every element on the blog. Hover over unusual elements and inspect hidden content or embedded text.






You’ve successfully completed the TryHackMe OSINT Challenge. This room is an excellent introduction to practical OSINT and digital forensics, teaching how to gather and analyze open-source information across multiple platforms.