Skip to content

leratomakhasane/tryhackme-ohsint

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

11 Commits
Β 
Β 
Β 
Β 

Repository files navigation

Project: TryHackMe β€” OhSINT

Platform: TryHackMe | Room: OhSINT | Difficulty: Easy
MITRE Tactic: TA0043 β€” Reconnaissance
Learning Path: SOC Analysis β†’ Incident Response β†’ DFIR

Table of Contents

⚠️ Spoiler Warning

This write-up documents my methodology and thought process after completing the room. If you haven't attempted OhSINT yet, I'd encourage you to try it first β€” the learning is in the doing. Try it on TryHackMe β†’

🎯 Objective

Given a single image file (WindowsXP.jpg), perform open-source intelligence (OSINT) gathering to uncover as much information about the file's owner as possible β€” with no other starting context.
This challenge simulates the pre-attack reconnaissance phase used by real threat actors, mapped directly to the MITRE ATT&CK framework. The goal is to develop the investigative pivot mindset foundational to SOC analysis, incident response, and digital forensics.

🧠 Skills Learned

  • Extracting and interpreting EXIF/file metadata using ExifTool
  • Username pivoting across social media, code repositories, and personal sites
  • Performing passive OSINT without direct target interaction
  • Geolocating a target using a Wi-Fi BSSID and Wigle.net
  • Identifying obfuscated data hidden in HTML/CSS source code
  • Mapping findings to the MITRE ATT&CK framework (TA0043 Reconnaissance)
  • Thinking in evidence chains β€” connecting artifacts into a full intelligence picture
  • Applying an attacker's perspective to understand blue team detection opportunities

πŸ› οΈ Tools

  • ExifTool β€” metadata extraction from image files
  • Google β€” passive OSINT, username enumeration across platforms
  • Twitter/X β€” social media profile analysis
  • GitHub β€” public repository review for exposed sensitive data
  • Wigle.net β€” BSSID-to-location geolocation mapping
  • Browser DevTools β€” HTML/CSS source inspection to uncover hidden content
  • WordPress β€” blog platform analysis for exposed personal information

πŸ” Steps Performed

Step 1 β€” Metadata Extraction
MITRE: T1592 β€” Gather Victim Host Information
The first action when handling any unknown file is to examine its metadata β€” this is standard practice in both OSINT investigations and DFIR work.

exiftool WindowsXP.jpg

Analysing the EXIF data revealed an attributed field that provided a starting username β€” the initial pivot point for all further investigation.
Screenshot of the output from the exiftool Screenshot of the full output of the exiftool

Step 2 β€” Username Pivoting & Social Media OSINT
MITRE: T1593 β€” Search Open Websites/Domains | T1593.001 β€” Social Media
With a username in hand, the next step was passive reconnaissance β€” searching publicly available sources without any direct interaction with systems.

Google search: [discovered username]

This surfaced several publicly accessible profiles across different platforms, each containing additional clues that could be chained together
Screenshot of the full output of the exiftool Screenshot of the full output of the exiftool Screenshot of the full output of the exiftool Screenshot of the full output of the exiftool Screenshot of the full output of the exiftool

Step 3 β€” Geolocation via BSSID
MITRE: T1591.001 β€” Determine Physical Locations
One of the discovered profiles contained a network identifier β€” specifically a BSSID (Wi-Fi access point hardware address). This type of data, when cross-referenced with public wireless databases, can resolve to a physical location. Screenshot of the full output of the exiftool

Step 4 β€” Hidden Data Discovery
MITRE: T1027 β€” Obfuscated Files or Information
A personal blog associated with the target contained information that was not immediately visible β€” only accessible by inspecting the raw page source rather than the rendered view. Screenshot of the full output of the exiftool

πŸ—ΊοΈ MITRE ATT&CK Mapping

Technique ID Name Application
TA0043 Reconnaissance Overarching tactic for the entire room
T1592 Gather Victim Host Information EXIF metadata extraction via ExifTool
T1593 Search Open Websites/Domains Username pivot across public platforms
T1593.001 Social Media Social media profile enumeration
T1591 Gather Victim Org Information Public repository and blog analysis
T1591.001 Determine Physical Locations BSSID geolocation via wireless database
T1027 Obfuscated Files or Information Hidden data in HTML/CSS source

πŸ“š Resources

MITRE ATT&CK β€” TA0043 Reconnaissance
MITRE ATT&CK β€” T1593 Search Open Websites/Domains
ExifTool Documentation
Wigle.net β€” Wireless Network Mapping
TryHackMe OhSINT Room
Google

About

TryHackMe OhSINT write-up - OhSINT recon mapped to MITRE ATT&CK TA0043.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors