Hi, this blog contains my solutions to the OSINT Industries CTF Challenges.

Disclaimer: This content is for educational purposes only.All information was obtained from publicly accessible sources, and no paid tools or unauthorised access methods were used.

TL;DR — Challenges Breakdown:

GEOINT

Find the Masked Man: Located the target using Google Maps analysis.

OSINT

DEPIX: Extracted hidden information via barcode scanning.

Holehe & the Secret Email: Used Holehe to identify the account creation date.

On the Traces of the Silk Road Black Market: Correlated Yelp data to identify Ross Ulbricht's profile and a review linked to a birthday location.

Found the Hacker: Crawled Archive.org with Waymore to recover forum posts, then pivoted from a username to an email, Twitter, and YouTube accounts.

FSB

FSB Part 1–3: Solved using publicly available data leaks.

INTERPOL

The Benarroch File: Retrieved address information from French business directories.

The Hadjej File: Identified the email address via data leak analysis.

GRU

GRU Foreign Operations: Interpreted poetic hints to map them to a famous case, then used official inquiry documents to extract related details.

EUROPOL

Operation LOCKERGOGA: Used Instagram to determine vehicle mileage.

Detailed Solutions

CHALLENGES:

· GEOINT Challenge: FIND THE MASKED MAN · OSINT Challenge # 1 DEPIX Challenge # 2 HOLEHE & THE SECRET EMAILChallenge # 3 On the Traces of the Silk Road Black MarketChallenge # 4 Found the HACKER · FSBChallenge: FSB PART 1Challenge: FSB PART 2Challenge: FSB PART 3 · INTERPOLChallenge # 1 The Benarroch FileChallenge # 2 The Hadjej File · GRUChallenge: 3GRU FOREIGN OPERATIONS · EUROPOLChallenge: Operation LOCKERGOGA

Let's Start:

GEOINT:

Challenge: FIND THE MASKED MAN

Description:

A photograph was taken in Paris on December 3rd, 2023, around 18:00. Your mission is to identify the nearest metro station to the location where the masked man was photographed.

Context:

Investigators received an image showing a masked individual standing in a central and upscale district of Paris.

The metadata and environmental observations indicate:

  1. The image was taken on December 3rd, 2023
  2. The approximate time was 18:00 (early evening)
  3. The location is in Paris, within a central and upscale area
  4. The scene is located near the intersection of a Rue and an Avenue

Objective:

Your objective is to determine the closest metro station to the photographed location, using only the contextual and visual clues provided.

Mission:

Analyze the given information and identify the nearest Paris metro station.

Lets start:

None

Let's zoom to read the text

None

the word "JULIEN" can be read and "blue mark" and "screen" can be seen

lets search "JULIEN" on google map focusing on "intersection of a Rue and an Avenue"

I identified this shop by matching visual details from the selfie above.

None
we see the "blue mark" and "JULIEN" from the selfie

now we explore from street view:

None

as you can see the "screen" "blue mark" and "JULIEN"

Analysing the image side by side:

None

Finding the Metro Station:

as you can see the "Train" icon it shows the bus stop for the metro station:

None

Based on the distance the nearest metro station is: Saint-Philippe-du-Roule

None
distance

OSINT :

Challenge # 1 DEPIX

Target Information:

A passenger posted a photo of their flight ticket online. The ticket is heavily pixelated, but key details remain partially recoverable.

Your task is to identify:

  • The passenger's first and last name
  • The seat number
  • The arrival airport IATA code
None

Let's start:

All the things are blurred but we only need this:

None

Lets scan this on this site

None
online-barcode-reader.inliteresearch.com

Lets analyse the result

M1CHEN/MICHAEL EONKMIF LAXPVGAA 0183 160F003D0120 347>118

Breakdown of the fields:

  • M — Format code: "M" indicates the mandatory format for a single-leg boarding pass (most common for direct flights).
  • 1 — Number of legs/segments: 1 (single flight segment).
  • CHEN/MICHAEL — Passenger name: Surname "CHEN", given name "MICHAEL"
  • EONKMIF — Electronic ticket indicator: "E" (electronic ticket), followed by conditional fields. "ONK" likely the operating carrier code "MIF" may be part of airline-specific data or frequent flyer info.
  • LAXPVGAA — From/to airports and airline: Origin "LAX" (Los Angeles International Airport), destination "PVG" (Shanghai Pudong International Airport), operating/marketing airline "AA" (American Airlines).
  • 0183 — Flight number: AA0183 (or carrier-specific numbering; American Airlines does operate routes or codeshares to PVG).
  • 160 — Julian date of flight: Day 160 of the year (June 9, since 2025 is not a leap year: January 31 + February 28 + March 31 + April 30 + May 31 = 151 days, so 160 = June 9).
  • F — Compartment/code (cabin class): "F" typically means First Class.
  • 003D — Seat number: 003D (seat D in row 3, common in first-class cabins).
  • 0120 — Sequence number: 0120 (boarding sequence or check-in order; used internally for boarding priority).
  • 347>118 — Beginning of variable/conditional fields: Starts with passenger status or source of check-in (e.g., "3" often web check-in, "4" airport). The ">" separates mandatory from optional sections, followed by airline-specific item identifiers like "1" (ticket number part), "18" (additional data).

Summary of the flight details:

  • PassengerMichael Chen
  • Flight — Likely American Airlines (AA) flight 183 (or codeshare) from Los Angeles (LAX) to Shanghai Pudong (PVG)
  • Date — June 9 (year inferred from context, e.g., 2025)
  • Cabin — First Class
  • Seat3D

Challenge # 2 HOLEHE & THE SECRET EMAIL

Description:

You are investigating the origins of a popular OSINT tool used to pivot from email addresses to online accounts: Holehe.

Behind every tool, there is a creator — and behind that creator, there is an email address.

Your mission is to trace back the very first appearance of the creator's email address online and determine the exact date it was created.

Objective:

Using open-source intelligence only, find:

  • The creator of Holehe
  • The public email address used for Holehe
  • The exact creation date of this email address

Let's start:

We can get the creator's eamil from his github profile:

None

We can use holehe on this email: megadose@protonmail

holehe:

holehe megadose@protonmail
None

and it shows the creation date:

None

Creation Date: 2021–01–14

Challenge # 3 On the Traces of the Silk Road Black Market

Background:

In 2010, before his arrest, Ross Ulbricht celebrated his girlfriend's birthday at a specific location. Through careful open-source analysis of information publicly available from that period, it is possible to determine:

  • The exact name of the location linked to the birthday celebration
  • The girlfriend's day and month of birth, which can be inferred from contextual clues found within legal, publicly accessible sources

Objective:

  • The name of the location associated with the 2010 birthday event
  • The girlfriend's day and month of birth

Let's start:

In 2010 ross's GF was "julia vie".

So let's find out her birthday

Google search shows this image uploaded on 25th sep, 2020

which means DOB is 25/09

None
insta post

from her insta we get to know about her business:

None

Let's explore yelp:

None

Reading Reviews by sorting as oldest:

None

but no review from 2010 , scrolling down we see not recommended reviews:

None

We find review by "Ross U" in 2010:

None
Ross Ulbricht's review

Why Reviews? Because its common to review each other business bw friends etc.

Let's use yelp "Search Friends"

None

and we got his profile

None

reading his reviews we got this:

None

DOB: 25th/09

Place: Aquarelle

Challenge # 4 Found the HACKER

Context:

Several years ago, a cybercriminal published a message on a well-known underground forum.

The individual was the author of the thread referenced below.

Thread Information:

  • Thread URL: https://[REDACTED]/Thread-New-User-pass-40k-gmail-prmuim-netflix-hulu-steam-uplay-spotify
  • Date: May 11, 2018–03:38 PM
  • Content: Just Do it : http://[REDACTED]

Objective:

Your mission is to identify the cybercriminal behind this forum post using open-source intelligence only.

You must determine:

  1. The email address used by the individual. This email appears on multiple cybercrime-related forums, allowing strong attribution.

2. The individual's Twitter account

3. The country where the individual lives (Country name must be provided in English.)

4. The individual's first name

Let's start:

So based on the format and the date it can be determind that the forum is "RaidForums" because it was very famous in 2018 and until its takedown….

  1. OSINT for EMAIL:

searching for the link https://raidforums.com/Thread-New-User-pass-40k-gmail-prmuim-netflix-hulu-steam-uplay-spotify

on wayback machine didn't bring any results:

None
archive.org

but the forum itself has been archived many times:

None
archive.org

So let's try to collect all the urls using waymore tool:

Why Waymore? Becuase it is fast and it also crawls urls from other sources like urlscan, alienvault etc…

waymore -i raidforums.com
None
waymore

after it has collected all the urls you will see waymore.txt which will have all the urls.

searching for the thread in waymore.txt

None
waymore.txt

Now its verified that the thread exists and it's from raidforums.

waymore also downloads the urls which can be found in ~/waymore/raidforums.com

None
downloaded urls

ripgrep for the thread in these files:

None

opening the file locally:

None

and on the wayback:

None
Thread

and we can see the thread author name which is "RoNey"

So in 2023 somebody had leaked the user database of raidforums searching for this username can lead us to his email.

Searching for "RoNey" in the db show his gmail "roneyads1@gmail.com"

None
raidforums user's db

Email: roneyads1@gmail.com

2. OSINT for Twitter account:

Searching for his gmail in leak dbs leads to his username:

None

Verifying:

None
X account

X: ii_ney

3 & 4. OSINT to find Country and FirstName:

google search leads us to his youtube channel:

None
youtube channel

Channel's About Section:

None
Name & Country

Name: Saad

Country: Morocco

FSB

Challenge: FSB PART 1

Context:

A historical dataset linked to an FSB-related leak contains partial civil information. Only the individual's identity is visible. The date of birth is missing.

Known Information:

  • Full name: КОВЖАРОВА ЕЛЕНА АЛЕКСАНДРОВНА
  • Gender: Female

Objective:

Using open-source intelligence methods, determine the date of birth of the individual.

Let's start:

КОВЖАРОВА ЕЛЕНА АЛЕКСАНДРОВНА is KOVZHAROVA ELENA ALEKSANDROVNA in english.

Searching for her name shows 3 results and 1 has an date

Let's explore this:

None

It shows her DOB and other things:

None

DOB: 11/12/1968

Challenge: FSB PART 2

Context:

A separate dataset references the same individual but contains only a digital contact identifier. Other personal identifiers were removed.

Known Information:

  • Email address: polinaak@rambler.ru

This email address appears across multiple historical data sources.

Objective:

Using passive OSINT correlation, identify the national social security identifier (SNILS) associated with the individual.

Let's start:

Searching for polinaak@rambler.ru in the data leaks shows 2 hits:

None
RussianTax 2022 Data Leak

and

None
Gosuslugi 2024

SNILS: 03262656135

Challenge: FSB PART 3

Context:

Archived online records indicate that personal identifiers were reused across social platforms. The profile itself is not directly named.

Known Information:

  • Email address: polinaak@rambler.ru
  • Phone number: +7 910 438 8202

Objective:

Identify the VK social network profile historically associated with these identifiers.

Let's start:

Searching for polinaak@rambler.ru in the data leaks shows this:

None
VK 2012 Data Leak

VKID: https://vk.com/id32508347

INTERPOL

Challenge # 1 The Benarroch File

Target Information:

Name: BENARROCH, INONE Date of birth: 19/05/1978 Age: 47 Country link: Israel, France

Objective:

Using only legal open-source intelligence methods, identify the last known address of the individual in the year 2015

Let's start:

"Inone BENARROCH" 2015 on google:

None

"residing at …." .So this site is worth checking…

Scrolling the site leads us to the "Free Document" section and it has some documents from the year 2015.

None

Let's download the above files.

1 file contains his name with address:

None

Address: Demeurant 95, Rue Sedaine — 75011 Paris

Challenge # 2 The Hadjej File

Target Information:

Name: Olivier HADJEJ Date of birth: 17/07/1967 Countries linked: France, Israel

Objective:

Using legal open-source intelligence methods, identify one email address that can be reasonably linked to the individual named above.

Let's start:

So searching for his name "Olivier HADJEJ" in the leaks

which gives us his email which:

None
Deezer leak

Email: olivierhadjej@hotmail.com

GRU

Challenge: 3GRU FOREIGN OPERATIONS

A fragment of an old poem has surfaced in an online dead-drop allegedly used by a former Russian intelligence agent. It is connected to a high-profile defection case, but nothing in the text is explicit.

Despite the ambiguity, the fragment contains enough indirect indicators — linguistic patterns, temporal references, and operational clues — to reconstruct the event.

Objectives

Using only legal open-source intelligence (OSINT) methods, identify:

  1. The NAME and SURNAME of the FSB agent who defected
  2. The exact date the covert operation took place (DD/MM/YYYY)
  3. The exact place of the operation (2 words)
  4. Shortly after the operation, a suspicious dark blue vehicle was reportedly seen parked near the entrance. Identify the registration plate of the vehicle.

Let's start:

An file named "pdf" is provided which can be viewed by adding extension pdf.pdf

None
pdf.pdf

Analysing its metadata:

exiftool pdf.pdf
ExifTool Version Number         : 12.30
File Name                       : pdf.pdf
Directory                       : .
File Size                       : 1837 KiB
File Modification Date/Time     : 2025:12:15 14:49:41+05:00
File Access Date/Time           : 2025:12:15 15:25:36+05:00
File Inode Change Date/Time     : 2025:12:15 15:25:36+05:00
File Permissions                : -rw-r--r--
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
Linearized                      : No
Page Count                      : 1
PDF Version                     : 1.4
Tagged PDF                      : Yes
XMP Toolkit                     : Image::ExifTool 13.30
Creator                         :Main Intelligence Directorate (GRU)
Subject                         : Don't waste your time on metadata. There's nothing there.
Title                           : «"TOP SECRET - For overseas operations"
Author                          : Management 54777
Producer                        : Main Intelligence Directorate (GRU)
Create Date                     : 2006:10:30 00:00:00
Modify Date                     : 2006:10:30 00:00:00
Keywords                        : operational, materials; disinformation; active, measures; special operations

Creation date is 2006:10:30

Correlation with real‑world timeline:

Late October 2006 aligns with one major foreign intelligence event:

Alexander Litvinenko:

  • Former FSB
  • Public defector and critic
  • Poisoned in London (capital hint is also in the Poem)
  • Incident date: 01/11/2006
  • Death: 23/11/2006 (Morse Code also hints at "MAKE HIM PAY" meaning revenge)

The PDF date (30/10/2006) is 48 hours before operation.

The Morse code also states: "USE YOUR HEAD AND YOUR TRAINING" which hints at that the suspect tried to poison him earlier:

None
earlier attempt on 16th Oct

Let's investigate this Case:

Now at this point we know the NAME and SURNAME. Let's find other required information:

2. The exact date the covert operation took place (DD/MM/YYYY)

Although it is a known fact that on November 1, 2006 — The successful poisoning occurred during a meeting at the Millennium Hotel's Pine Bar in London, where Litvinenko drank tea laced with polonium-210.

Let's verify it ourself:

Searching for the inquiry leads us to the The Litvinenko Inquiry by UK GOV

None

They had meeting in Pine Bar:

None
https://assets.publishing.service.gov.uk/media/5a8055c340f0b62302692e48/The-Litvinenko-Inquiry-H-C-695-web.pdf

Receipt from pine bar which mentions date, time and "TEA" etc..

DATE: 01/11/2006

None
https://webarchive.nationalarchives.gov.uk/ukgwa/20150902170938mp_/https://www.litvinenkoinquiry.org/wp-content/uploads/2015/04/INQ015344wb.pdf
None
https://assets.publishing.service.gov.uk/media/5a8055c340f0b62302692e48/The-Litvinenko-Inquiry-H-C-695-web.pdf

3. Location: PINE BAR

4. suspicious dark blue vehicle:

This is where the challenge became difficult, as I could not find any "suspicious dark blue vehicle" that arrived shortly after the operation.

The only blue car visible in the CCTV footage had a very blurred license plate, and the other vehicles listed in the Radiation Schedules were not accepted by the challenge.

Eventually, the correct vehicle turned out to be one I had initially dismissed, as it dated back to 2008.

However, a partial license plate was visible. By correlating the readable digits, it was possible to reconstruct the plate:

None
__54 _PL
None
L_54 _PL
None
L_54 XPL

The only missing digit looks like: B, 8 , D ,0

Guessing above digits with L_54 XPL. I got this and it matches the colour and make

None

!suspicious dark blue vehicle: LD54XPL

EUROPOL

Challenge: Operation LOCKERGOGA

Target Information:

  • Name: TYMOSHCHUK (ТИМОЩУК), Volodymyr Viktorovych (Володимир Вікторович)
  • Date of birth: October 2, 1996 (29 years old)
  • Countries linked: France, Ukraine

Objective:

Using legal open-source intelligence methods, identify:

  1. the licence plate of the vehicle linked to the individual
  2. its brand
  3. model
  4. year of manufacture
  5. last known mileage

Let's start:

"Volodymyr Tymoshchuk" AND "Car" searching on Google

Result shows an link with an License plate so it's worth exploring

None
  1. we see the car license plate: AB6637IE

Exploring above blog:

None
https://decodecybercrime. com/eu-most-wanted-digital-footprints-of-volodymyr-viktorovich-tymoshchuk/

Now we also have the VIN: WP1ZZZ9YZKDA39521

And INSTA profile has the Car image that confirms the license plate:

None

We can use the VIN to find more details about the car

Using api from https://www.vehicleregistrationapi. com as it has Precise Data.

None
https://www.vehicleregistrationapi. com

2. BRAND: PORSCHE

3. Model: CAYENNE

4. YEAR: 2019

Now let's find out the milage:

None
PORCSHE logo and mileage meter

Let's download this "highlight" to see digits clearly

Viewing the story frame by frame:

5 . we can now clearly see the mileage: 36921KM

Conclusion:

Overall, this CTF emphasised the importance of methodology, patience, and attention to detail in OSINT investigations. The correct answers often came from re-evaluating assumptions and correlating small pieces of publicly available information. OSINT Industries delivered a challenging and realistic set of scenarios that effectively reinforced real-world OSINT workflows.