Tags: github osint forensics git 

Rating: 1.0

# Prompt
> The new Head of Crime Analytics is named - The Deep. The Deep addresses the Crime team and Cassandra brings cupcakes for the team. They fired most of the staff because of past tweets that were critical of Homelander. Homelander as paranoid as ever believes that the boys has yet another plan to take down Vought International. As one of the members from the few left behind it is upon your shoulders to crack down on the boys' plan to take down Vought by looking into the suspicious GitHub user who goes by the name [`sk1nnywh1t3k1d`](https://github.com/sk1nnywh1t3k1d) or face Homelander's wrath.

# Solution
## GitHub
1. The GitHub profile can be found at <https://github.com/sk1nnywh1t3k1d>.
1. This GitHub user has only one repository with only 2 commits at <https://github.com/sk1nnywh1t3k1d/chat-app>.
1. The first commit added a file named `chat.txt` that was deleted on the second commit at <https://github.com/sk1nnywh1t3k1d/chat-app/commit/d830e9b9a9cd531b2677bad94b4a08d7a539738b#diff-d341c91ed9aff89bf6ea2d5fa7b245307f745a1e9374328e47c79f1529be627a>.
* The commit also has author's the email (`[email protected]`), visible when viewing the [verbose commit patch](https://github.com/sk1nnywh1t3k1d/chat-app/commit/d830e9b9a9cd531b2677bad94b4a08d7a539738b.patch), by appending `.patch` to the commit URL.
1. The `chat.txt` file mention the shortened URL <https://bit.ly/voughtencrypted>

## WAV
1. When the audio file is shown in [Audacity's Spectrogram](https://manual.audacityteam.org/man/audacity_waveform.html#multi), the following text (`thguovdne hsals drawrof yl tod tib`) can be seen:
![Audacity's Spectrogram showing text of a message](https://applegamer22.github.io/posts/nitectf/boys/audio_text_huabd686caddb28ea42071ab6de3ccd504_240667_1320x0_resize_q75_box.jpg)
1. By reversing the message, the shortened URL (<https://bit.ly/endvought>) can be read:

```sh
$ echo "thguovdne hsals drawrof yl tod tib" | rev
bit dot ly forward slash endvought
```

## PNG
1. The previously-mentioned shortened URL leads to an image file download:
![](https://applegamer22.github.io/posts/nitectf/boys/7_tower_hu3e170f22d1730067613e3521715007c3_725085_1320x0_resize_box_3.png)
1. The shredded red text looks like an email address, but since the email address looks like the one found in the [commit](#github) metadata, I didn't un-shred the picture. **During the event, I had not idea how to continue from here, with the email address in hand.**

## E-mail Address
1. **I didn't figure it out during the event**, but once I had Hughie's email address I could find his public Google calendar with the hyper link [calendar.google.com/calendar/u/0/embed?src=`[email protected]`](https://calendar.google.com/calendar/u/0/[email protected]).
* Additional intelligence could be gathered about the email address using tools such as [EPIEOS](https://epieos.com).
* The Google ID of the email address could be gathered by initiating a Google Hangouts chat and inspecting the HTML at the recipient's details.
1. The only event during December 2022 has the flag `niteCTF{v0ught_n33ds_t0_g0_d0wn}`.

Original writeup (https://applegamer22.github.io/posts/nitectf/boys/).