Rating:

# UTCTF 2022 Osint Full (Category: Misc)
The challenge is the following,

![Figure 1](img/challenge.png)

We are given the username of the person we are targeting, which is `EddKing6`. It also mentions that the email should contain the strings `blob` and `corp`, so this is something we should be looking for when searching Ed King. Also, we will need to look for the following info:

- Name of his dog
- His favorite video game
- His alma master
- His role at his company
- Favorite food
- His email

It doesn't explicitly state which social media websites we are supposed to search except for DeviantArt and Soundcloud, so I started off with Twitter to get more clues about this person.

In fact, searching `EddKing6` on Twitter returned [this account](https://twitter.com/eddking6).

We can see that the account was created on `February 2022` and that he runs `blob corp`, so we can be certain that this is the Edd King we are looking for.

![Figure 2](img/edd.png)

We can see that Edd King has posted the following tweets.
![Figure 3](img/tweets.png)

From the tweet `I like to play FactorIO when I'm not busy being a #CISO`, we can see that he is a `CISO` and he plays `FactorIO`. However, I wasn't too sure what `FactorIO` was, so I did a Google Search and revealed that it was in fact a video game.

![Figure 4](img/factorio.png)

From the tweets alone, we have found the following so far:
- Name of his dog: ?
- His favorite video game: `FactorIO`
- His alma master: ?
- His role at his company: `CISO`
- Favorite food: ?
- His email: ?

One of his tweets includes a link to [his Github's vulnerable web app respository](https://github.com/eddking6/vulnerable-web-app).

![Figure 5](img/vulnwebapp.png)

I did some searching on this repository, but couldn't find what I was looking for, so instead, I went to [his Github profile](https://github.com/eddking6) from this vulnerable web app repository.

![Figure 6](img/github.png)

His profile bio says `I love walking my dog and eating Cacio e Pepe`. I wasn't too sure what `Cacio a Pepe` was, so I did a Google Search and revealed that it was a type of pasta.

![Figure 7](img/pasta.png)

Now we have found out that `Cacio e Pepe` is his favorite food. Now on his Github, he has another repository called [DogFeedScheduler](https://github.com/eddking6/DogFeedScheduler) written in Go.

![Figure 8](img/dogfeed.png)

Digging through the files, I found the following in [quickstart.go](https://github.com/eddking6/DogFeedScheduler/blob/main/quickstart.go).

![Figure 9](img/spotemail.png)

This shows us his email, which is `[email protected]` and his dog's name which is `Spot`.

From the tweets and Github, we have found the following so far:
- Name of his dog: `Spot`
- His favorite video game: `FactorIO`
- His alma master: ?
- His role at his company: `CISO`
- Favorite food: `Cacio a Pepe`
- His email: `[email protected]`

Now we just need his alma master. I assumed that the most likely place someone would list their alma master would be Linkedin, so I went ahead and tried inputting his username `EddKing6` into the Linkedin link like `https://www.linkedin.com/in/eddking6/`.

This brought us to [Edd King's LinkedIn](https://www.linkedin.com/in/eddking6/). Here, we can see that his alma master is at `Texas A&M University`, and also confirms that his role at his company Blob Corp is `CISO`.

![Figure 10](img/linkedin.png)

From the tweets, Github and Linkedin, we have found the following:
- Name of his dog: `Spot`
- His favorite video game: `FactorIO`
- His alma master: `Texas A&M University`
- His role at his company: `CISO`
- Favorite food: `Cacio a Pepe`
- His email: `[email protected]`

Now, the challenge says we need to `send him a carefully crafted phishing email including all the details.`. I felt that just sending the information we found would be enough to get me the flag, but I decided to make it more believable by impersonating someone he might know.

Based on his Twitter, it seemed that he was pretty close to [Nichole Stephenson](https://twitter.com/Nichole48928026).

![Figure 11](img/steph.png)

So I decided to make a Gmail account that impersonates Nichole Stephenson.

![Figure 12](img/googleaccount.png)

I wanted to make the phishing mail as believable as possible, so I wrote an email to `[email protected]` saying that there is a company party that celebrates his achievements as a CISO, and embedded all the required information while trying to sound natural and believable.

![Figure 13](img/phish.png)

Then I received the flag after a few minutes of sending the email.

![Figure 14](img/flag.png)

Here's another variation of the email I made which I thought might be interesting to share, where Nichole requests admin access to fix up the company's password reset system.

![Figure 15](img/draft.png)

Thus, the flag is,

`utflag{osint_is_fun}`

Original writeup (https://github.com/LambdaMamba/CTFwriteups/tree/main/UTCTF_2022/misc/osint_full).