Rating:

# Holloway
OSINT

## Challenge

![screenshot1.png](Description.png)

## Solution

following the provided challenge link
```https://dikelaw535.wixsite.com/holloway```
we are met with the following web page

![screenshot2.png](Wixsite.png)

that ain't good :/ no Secrets yet ... hh
but again maybe it was there but deleted :)
checking through using Wayback Machine we get something

![screenshot3.png](Waybackurl.png)
a twitter handle @juliusKingsleyy
following the link
```https://twitter.com/juliusKingsleyy```

we are met with the following page, just a weird looking tweet

![screenshot4.png](JuliusKingsleyy.png)

aha!

the challenge name is a hint for Twitter Steganography technique.
we decode the tweet using the site
holloway.nz/steg/

and there we get our flag

![screenshot5.png](holloway.png)

## Flag : RaziCTF{secret1337}

Original writeup (https://github.com/fr334aks/RaziCTF-Writeups/tree/main/OSINT/Holloway).