Handle Reuse

Description

During ongoing monitoring of a suspicious online persona, analysts identified a username that appears across multiple unrelated activities.

The account itself reveals very little, but small details such as naming conventions, profile content, and public traces may help correlate the identity elsewhere online.

Your task is to investigate the username and determine whether it has been reused on another platform. Identify the second account most strongly associated with the same persona.

How to get started:

  1. download the evidence data
  2. start investigating
  3. Password: osintchallenges.com
Download Challenge File

Suspicious Email Activity

During ongoing monitoring of a suspicious online persona, analysts intercepted an email believed to be associated with the same individual previously observed sharing public activity data.

The message does not appear to be a typical phishing attempt, but may indicate involvement in unauthorized access to external systems.

Initial review suggests the email may have originated from infrastructure unrelated to the sender’s claimed identity.

Your task is to analyze the email metadata, identify the true origin of the message, and determine where the email was sent from.

How to get started:

  1. Download the file
  2. Investigate
Download Challenge File

Password: osintchallenges.com

Unverified Earthquake Footage

A video circulating online claims to show structural damage to a building on March 28, 2025 following an earthquake.The original post does not include any reliable location metadata, and the authenticity of the footage is unknown.

Objectives

  • Watch the video carefully
  • Inspect individual frames for visual clues
  • Identify the location shown in the footage
  • Determine the name of the site

Public Fitness Leak

During a review of public digital traces tied to a suspicious online persona, analysts identified a fitness-tracking account that may belong to the same individual operating under a different identity.

The account appeared harmless at first glance, containing several running activities with routine titles and publicly shared route maps. However, repeated activity patterns, route geometry, timestamps, and recurring landmarks may reveal more information than intended.

Your task is to review the recovered evidence and determine what the subject’s activity history reveals. By analyzing the routes and identifying repeated locations, determine the city most strongly associated with the account and the public landmark that appears central to the subject’s activity pattern.

How to get started:

  1. Download the file
  2. Investigate
Download Challenge File

PASSWORD: osintchallenges.com

Unknown Host

Connection Log
Source IP: 223.130.192.2
Message:경복궁은 서울에서 가장 유명한 궁궐이다

Challenge Description:

During an investigation, analysts recovered a connection log from a remote server.The log contains a source IP address and a message written in a foreign language.Your mission is to analyze the IP address, determine the origin of the message, translate the text, and identify the real-world location being referenced.

Transmission Intercepted

An intercepted radio transmission was captured during routine monitoring operations.The signal appears structured and repetitive, suggesting a deliberate encoded message.Your mission is to analyze the audio transmission, decode the signal, and determine the real-world location being referenced.

How to get started:

  1. Download the file
  2. Investigate
Download Challenge File

A message in plain sight

Challenge Description

A photograph was recovered during an investigation.

At first glance, the image appears completely unrelated to any specific location. However, digital files often contain hidden information embedded within their metadata.

Your mission is to analyze the image file and determine the real-world location referenced in the hidden message.

To Get Started:

  1. Download the folder
  2. Unzip the folder
  3. Enter the password “osintchallenges.com”
  4. Start investigating
Download Challenge File

Final Destination

A packet capture file has been recovered from a user’s browsing session.

The capture contains several normal website visits followed by one final destination.

Your mission is to analyze the network traffic and determine which domain the user accessed last.

This challenge focuses on network analysis fundamentals, including DNS inspection and traffic interpretation using packet capture data.

Getting Started

  • Download the challenge file using the button above.
  • Extract the ZIP archive using the password:
osintchallenges
  • Open the extracted PCAP file in Wireshark.
  • Inspect the captured traffic and submit your answer below.

What Powers This Site?

A publicly accessible website is running a specific content management system (CMS).

Your mission is to analyze the target website and determine which CMS powers the site.

Target: https://www.tesla.com

When did the Ship Arrive?

The container vessel shown below was observed operating in U.S. waters.

Using open-source maritime tracking data, your mission is to determine the date on which this vessel arrived at Port Houston, United States.

This challenge focuses on transportation OSINT, including vessel identification, voyage history analysis, and AIS-based tracking.

Objectives

  • Identify the vessel shown in the image
  • Analyze maritime tracking data for the vessel
  • Determine the arrival date at Port Houston, United States