✍️
CTFs
Home
  • CTF Writeups
  • Tools and Payloads
  • TryHackMe
    • TryHackMe Overview
      • Advent of Cyber 2
        • Day 01 - Christmas Crisis
        • Day 02 - The Elf Strikes Back!
        • Day 03 - Christmas Chaos
        • Day 04 - Santa's Watching
        • Day 05 - Someone stole Santa's gift list!
        • Day 06 - Be careful with what you wish on a Christmas night
        • Day 07 - The Grinch Really Did Steal Christmas
        • Day 08 - What's Under the Christmas Tree?
        • Day 09 - Anyone can be Santa!
        • Day 10 - Don't be sElfish!
        • Day 11 - The Rogue Gnome
        • Day 12 - Ready, set, elf
        • Day 13 - Coal for Christmas
        • Day 14 - Where's Rudolph?
        • Day 15 - There's a Python in my stocking!
        • Day 16 - Help! Where is Santa?
        • Day 17 - ReverseELFneering
        • Day 18 - The Bits of Christmas
        • Day 19 - The Naughty or Nice List
        • Day 20 - PowershELlF to the rescue
        • Day 21 - Time for some ELForensics
        • Day 22 - Elf McEager becomes CyberElf
        • Day 23 - The Grinch strikes again!
        • Day 24 - The Trial Before Christmas
      • Web Fundamentals
      • Anonymous
      • Printer Hacking 101
      • OWASP Top 10
        • Injection
        • Broken Authentication
        • Sensitive Data Exposure
        • XML External Entity
        • Broken Access Control
        • Security Misconfiguration
        • Cross-Site Scripting
        • Insecure Deserialization
        • Components with Known Vulnerabilities
        • Insufficent Logging & Monitoring
      • Vulnversity
      • Nmap
      • Google Dorking
      • Blog
      • Metasploit
      • OhSINT
      • Searchlight - IMINT
      • Basic Pentesting
      • Crack the Hash
      • Crack the Hash 2
      • Year of the Jellyfish
      • VulnNet - DotJar
      • Encryption - Crypto 101
      • CC: Pen Testing
      • Kenobi
      • Linux Backdoors
      • Root Me
      • DNS Manipulation
      • OWASP Juice Shop
      • Pickle Rick
      • CC: Steganography
      • OverPass
      • OverPass 2 - Hacked
      • OverPass 3 - Hosting
      • Mr Robot CTF
      • VulnNet
      • Linux PrivEsc
      • Git Happens
      • Buffer Overflow Prep
      • BrainPan
      • CC: Ghidra
      • Intro to x86-64
      • CC: Radare2
      • Linux Forensics
      • ReverseEngineering
      • Reversing ELF
      • Simple CTF
      • c4ptur3-th3-fl4g
      • Cat Pictures
      • Bounty Hacker
      • That's the Ticket
      • Brute It
      • Smag Grotto
      • Ignite
      • Ninja Skills
      • Break It
      • Mustacchio
      • Agent Sudo
      • Poster
      • Fowsniff CTF
      • Juicy Details
      • The Impossible Challenge
      • Golden Eye
      • Lian_Yu
      • Couch
      • GateKeeper
      • WebAppSec 101
      • Advent of Cyber 1
        • Day 01 - Inventory Management
        • Day 02 - Arctic Forum
        • Day 03 - Evil Elf
        • Day 04 - Training
        • Day 05 - Ho-Ho-Hosint
        • Day 06 - Data Elf-iltration
        • Day 07 - Skilling Up
        • Day 08 - SUID Shenanigans
        • Day 09 - Requests
        • Day 10 - Metasploit-a-ho-ho-ho
        • Day 11 - Elf Applications
        • Day 12 - Elfcryption
        • Day 13 - Accumulate
        • Day 14 - Unknown Storage
      • Hacker of the Hill
  • HackTheBox
    • HackTheBox Overview
      • Emdee five for life
      • Templated
      • Phonebook
  • HackTheBox Academy
    • HTB Academy Overview
  • PortSwigger Academy
    • PortSwigger Overview
      • Authenication bypass via OAuth implicit flow
      • Forced Oauth Profile Linking
      • OAuth account hijacking via redirect_uri
      • Stealing OAuth access tokens via an open redirect
      • Stealing OAuth access tokens via a proxy page
  • 2021 CTFs
    • Gurugram Cyber Heist CTF 2021
      • All About Web
      • Are You Web Expert
      • Mobile Phones are Bad
      • The Last Step
      • Social Media Havoc
    • ZH3R0 CTF 2.0 2021
      • Misc - Small Maniac's Game
      • Web - bxss
      • Web - Sparta
      • Web - Baby SSRF
      • Web - Original Store v1 and v2
      • Web - strpos and substr
    • NahamCon 2021
      • esab64
      • Bionic & Meet the Team
      • Gus & Hercules
      • Pollex
  • 2020 CTFs
    • VulnCon2020 Overview
      • Noob Bot Welcomes You!
      • Maze
      • Pcaped
Powered by GitBook
On this page
  • Fundamentals
  • Welcome
  • Did you understand the flag format?
  • Your First Challenge
  • What is the name of the street where this image was taken?
  • Just Google it!
  • Which city is the tube station located in?
  • Which tube station do these stairs lead to?
  • Which year did this station open?
  • How many platforms are there in this station?
  • Keep at it!
  • Which building is this photo taken in?
  • Which country is this building located in?
  • Which city is this building located in?
  • Coffee and a light lunch
  • Which city is this coffee shop located in?
  • Which street is this coffee shop located in?
  • What is their phone number?
  • What is their email address?
  • What is the surname of the owners?
  • Reverse your thinking
  • Which restaurant was this picture taken at?
  • What is the name of the Bon Appétit editor that worked 24 hours at this restaurant?
  • Locate this sculpture
  • What is the name of this statue?
  • Who took this image?
  • Justice for all
  • What is the name of the character that the statue depicts?
  • where is this statue located?
  • What is the name of the building opposite from this statue?
  • The view from my hotel room
  • What is the name of the hotel that my friend is staying in?
  • Reference Links
  1. TryHackMe
  2. TryHackMe Overview

Searchlight - IMINT

PreviousOhSINTNextBasic Pentesting

Last updated 1 year ago

Date: 02, March, 2021

Author: Dhilip Sanjay S


to go to the TryHackMe room.

Fundamentals

  • IMINT - Imagery Intelligence

  • GEOINT - Geospatial Intelligence

Welcome

Did you understand the flag format?

  • Answer: sl{ready}


Your First Challenge

  • Before using any tool or methodolody for finding the location of the image, scan the image with your eyes.

    • Extracting the key data points will help you to apply the right tool:

      • Google Search

      • EXIF tool

  • Five elements of IMINT

    • Context

    • Foreground

    • Background

    • Map markings

    • Trial and error

  • Look for signs such as:

    • Location (Street name, Storefront signs)

    • Determine the country or region (based on which side of road they drive, language or architectural characteristics)

    • Unique landmarks, building, bridges, statues or mountains.

What is the name of the street where this image was taken?

  • Answer: sl{carnaby street}


Just Google it!

  • Use google dorking or reverse image search

Which city is the tube station located in?

  • Answer: sl{London}

Which tube station do these stairs lead to?

  • Answer: sl{Piccadilly Circus}

Which year did this station open?

  • Answer: sl{1906}

How many platforms are there in this station?

  • Answer: sl{4}


Keep at it!

Which building is this photo taken in?

  • Answer: sl{VANCOUVER INTERNATIONAL AIRPORT}

  • Clue: yvr.ca

Which country is this building located in?

  • Answer: sl{Canada}

Which city is this building located in?

  • Answer: sl{Richmond}


Coffee and a light lunch

Which city is this coffee shop located in?

  • Answer: sl{Blairgowrie}

  • Clue: https://www.dailyrecord.co.uk/in-your-area/jobs-fear-perthshires-edinburgh-woollen-22870964

Which street is this coffee shop located in?

  • Answer: sl{allan street}

  • Steps to Reproduce: Google Maps

What is their phone number?

  • Answer: sl{+447878 839128}

What is their email address?

  • Answer: sl{theweecoffeeshop@aol.com}

What is the surname of the owners?

  • Answer: sl{Cochrane}

  • Clue: https://www.barba.org.uk/blairgowrie-and-rattray-businesses/the-wee-coffee-shop


Reverse your thinking

  • Reverse image search

  • RevEye Reverse Image Search Extension

Which restaurant was this picture taken at?

  • Answer: sl{katz's deli}

What is the name of the Bon Appétit editor that worked 24 hours at this restaurant?

  • Answer: sl{andrew knowlton}


Locate this sculpture

What is the name of this statue?

  • Answer: sl{Rudolph the Chrome Nosed Reindeer}

  • Clue: Norwegian - Og når det er vind og sno Blir han så kald på nesen, Så den lyser som en glo

Who took this image?

  • Answer: sl{Kjersti Stensrud}

  • Clue: visitoslo -> outdoor sculpture


Justice for all

  • Visual Intelligence

What is the name of the character that the statue depicts?

  • Answer: sl{Lady Justice}

where is this statue located?

  • Answer: sl{Alexandria, Virginia}

  • Clue:

    • Use bing reverse image search. Don't rely only on Google reverse image search! Also check out Yandex.

    • It's located in a district court.

What is the name of the building opposite from this statue?

  • Answer: sl{The Westin Alexandria Old Town}

  • Clue: Use google maps


The view from my hotel room

What is the name of the hotel that my friend is staying in?

  • Answer: sl{NOVOTEL SINGAPORE CLARKE QUAY}

Use google maps and look for Clarke Quay Central


Reference Links

Click Here
Using FFmpeg to grab stills and audio for OSINT
FFmpeg
Guide To Using Reverse Image Search For Investigations
Tips and Tricks on Reverse Image Searches
RevEye Reverse Image Search Extension
A lesson on looking (Visual Intelligence)- Amy Herman
Task 2
Task 3
Task 4
Task 5
Task 6
Task 7
Task 8