Mini note: I didnt solve these challenges in the CTF event # To the sky ![image](https://hackmd.io/_uploads/rkYxd8jXyl.png) First of all, the description mentioned "social media," so I searched the ones I know, X and Instagram, and discovered these two accounts. ![image](https://hackmd.io/_uploads/Bk5sO8jXJg.png) ![image](https://hackmd.io/_uploads/H1rpOIjQkx.png) ![image](https://hackmd.io/_uploads/BkQ4KIjQkl.png) ![image](https://hackmd.io/_uploads/S1ZSYUoQyl.png) After checking these accounts with WebArchive, I didn't find anything suspicious. ![image](https://hackmd.io/_uploads/HyIL9IiXJg.png) And after searching with whatsmyname, I found his GitHub account. ![image](https://hackmd.io/_uploads/BkMLiUiXkx.png) I checked this link, and it seems to be just a music... His repo have 2 commits, so I also checked it and found something: ![image](https://hackmd.io/_uploads/SJW9sLjmyg.png) ![image](https://hackmd.io/_uploads/HJxP6oLiX1l.png) This link redirects to the YouTube link above :v, so we didn't find anything special here either. --- **Analyze Step**: The description mentions `social media`, and we searched on popular platforms. All three accounts share the same username, but we couldn't find anything new here. Therefore, there might be other accounts on different platforms --- We need to narrow down the search scope by checking which country he is from ![image](https://hackmd.io/_uploads/H1YI6LjQke.png) ![image](https://hackmd.io/_uploads/HkdCa8j7Jl.png) I checked his last name by searching on LinkedIn and found another person with the same last name from France. Therefore, we can conclude that he might be from France. ![image](https://hackmd.io/_uploads/SkT3ALi7yl.png) In my opinion, to achieve the most accurate results, we should use the language of that country for the search. I searched with `top social media in France`, translated to `les meilleurs réseaux sociaux en France`. ![image](https://hackmd.io/_uploads/Sy9IxDsXkl.png) After checking a few platforms, we discovered that he uses this social media that we didnt found by `whatsmyname`: `(https://www.tumblr.com/elowenvaelith)` ![image](https://hackmd.io/_uploads/HJv8OvjXyg.png) I noticed this post When we searched about the flag format, we can see it is a plane ![image](https://hackmd.io/_uploads/HJCFuvs7ke.png) So our mission is that find the plane he mention in this post. Just copy and paste that post on `Bing` ![image](https://hackmd.io/_uploads/Hk69MjnQ1g.png) ![image](https://hackmd.io/_uploads/Hkdnzo2Qye.png) So the flag is: `wwf{piper_aerostar}` # Identity ![image](https://hackmd.io/_uploads/ryHq5voX1l.png) I found his email through GitHub and sent a random message to this Gmail address. I received the following response: ![image](https://hackmd.io/_uploads/B1I-ovjXkl.png) `https://github.com/elowenvaelith/fuzzy-octo-garbanzo/commit/84344b9ca7bf4bf9616cb7d727aa7c22eff05d00.patch/` put `.patch/` after the commit and then see it ![image](https://hackmd.io/_uploads/B1J09wiXyx.png) **Analyze Step**: - He mention about `message me at` - about pgp : ![image](https://hackmd.io/_uploads/r1Qbnvi7yg.png) So we need to find the app/platform use this pgp I searched `best pgp app` ![image](https://hackmd.io/_uploads/BJbQCwoQJl.png) There are some app: ![image](https://hackmd.io/_uploads/BkQDRPi7Jx.png) The first one is just open source ![image](https://hackmd.io/_uploads/Skij0DjX1l.png) And `keybase` is the platform to message - right with our analyze: ![image](https://hackmd.io/_uploads/H1qykusQkg.png) ![image](https://hackmd.io/_uploads/HJwY1diXJe.png) ![image](https://hackmd.io/_uploads/rkHR1uiQkl.png) So this platform have a lot of users, so we can find the account of Elowen Vaelith with that pgp. First, we need to understand how this platform act: So, I create account to understand that ![image](https://hackmd.io/_uploads/SJX4ZdsXke.png) ![image](https://hackmd.io/_uploads/HJP5-uomkg.png) So this is my key: ![image](https://hackmd.io/_uploads/rJQAb_oXJx.png) We didnt know what is this key meaning, so we need to find the place to decode this key: I searched `pgp decoder` and find this one: ![image](https://hackmd.io/_uploads/HJIKzdiQJl.png) So first, I decode my key: Our key have a lot of part: ![image](https://hackmd.io/_uploads/ryPy7dsXyx.png) Next, I decode the key that I gave from Elowen Vaelith: ![image](https://hackmd.io/_uploads/Sky9mOjXye.png) So, his key gave the information about signature packet: So next step, we need to check `signature packet` of our key: ![image](https://hackmd.io/_uploads/r1KlN_j71x.png) From there, we can notice about `keyid` ![image](https://hackmd.io/_uploads/rJz84OjmJx.png) That `keyid` is the same with the data in my profile: ![image](https://hackmd.io/_uploads/HJKDNdo7kl.png) ![image](https://hackmd.io/_uploads/rykjV_sX1g.png) So that, when anyone click to your profile, they can see this `keyid` From there, we can find Elowen Vaelith's profile with this `keyid` ![image](https://hackmd.io/_uploads/ryViuOoQkl.png) ![image](https://hackmd.io/_uploads/SkmR_dsQJg.png) But it didnt work with his keyid but mine is yes, idk why :v So I have to read the docs about api (the top of my search) And found this one: ![image](https://hackmd.io/_uploads/SylUjOiXJl.png) Look at another docs to find the format to use key/fetch: ![image](https://hackmd.io/_uploads/S1D5o_sQkx.png) So it is: `https://keybase.io/_/api/1.0/key/fetch.json?pgp_key_ids=e2792425ca477506` ![image](https://hackmd.io/_uploads/SJFWhOoQ1e.png) So his username is: `orionjules` ![image](https://hackmd.io/_uploads/BJnVndoXyg.png) So we found his real name: `Orion Jules Stewart` `wwf{orion_jules_stewart}` # Memorial ![image](https://hackmd.io/_uploads/Hkuqhds71e.png) So, usually, after found his real name we need to find family tree to find his sister: He is from France so: ![image](https://hackmd.io/_uploads/rJ1f0_iQye.png) ![image](https://hackmd.io/_uploads/S1CwyKomJe.png) ![image](https://hackmd.io/_uploads/rk3FJFsmyg.png) So this is her fav song: ![image](https://hackmd.io/_uploads/rkij1FjQ1g.png) `wwf{heads_in_the_clouds}` # Bulletproof ![image](https://hackmd.io/_uploads/H1ZxxKsX1x.png) In the picture, I flip the photo sideways and look in the window to see 3_07 S Tacoma, 98405 ![image](https://hackmd.io/_uploads/SJ8IltjXke.png) So I search on Google Maps: `Tacoma, 98405` So that, I know it is Tacoma WA 98405 ![image](https://hackmd.io/_uploads/ry1hlKimyx.png) We just simply brute the miss number: 0-9, When I searched with "9", google mention about Shell: ![image](https://hackmd.io/_uploads/SJwAbYoXye.png) ![image](https://hackmd.io/_uploads/r1s2ZYjXJe.png) So it is: `wwf{3907s12thst_tacoma_wa98405_usa}`