# OSINT 1 - Forensics

## Task

It seems like companies have document leaks all the time nowadays. I wonder if this company has any.

(NOTE: It turns out there's also an actual company named Kakuu in Japan. The real company is not in scope. Please don't try and hack them.)

<http://puffer.utctf.live:8756>

Hints:

You're looking for a leaked document. You won't find it on their website.

Accounts online associated with the scenario should be (fairly) distinguishable.

## Solution

We get the following URL address:

```
http://puffer.utctf.live:8756
```

Let's visit the website:

<figure><img src="https://1764482864-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FsK05LA2NAjKs68dl8qHP%2Fuploads%2FC3zc8tqDik5y3gWs8dVb%2Fimage.png?alt=media&#x26;token=b7074b98-a335-4232-b837-a545c8cea06f" alt="" width="563"><figcaption></figcaption></figure>

In the `Team` section we find information about the Kauu Corporation employees:

<figure><img src="https://1764482864-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FsK05LA2NAjKs68dl8qHP%2Fuploads%2FDVDw8Chq6Gs84JQdNdCs%2Fimage.png?alt=media&#x26;token=227a5202-b18a-4af2-be5d-bbb14665218f" alt="" width="563"><figcaption></figcaption></figure>

To get more information about the employees I used the SpiderFoot tool, which can be found [here](https://github.com/smicallef/spiderfoot). SpiderFoot is an OSINT automation tool. I run a scan in SpiderFoot for each employee, based on their first name and surname. I obtained the following results:

<figure><img src="https://1764482864-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FsK05LA2NAjKs68dl8qHP%2Fuploads%2FCF4tfzb9DLCxhqPX8LmY%2Fscan_results.PNG?alt=media&#x26;token=59ec38c8-3650-4047-bc63-13e9090d60a8" alt=""><figcaption></figcaption></figure>

Let's start with the employee for whom the fewest results appeared, that is Cole Minerton.&#x20;

<figure><img src="https://1764482864-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FsK05LA2NAjKs68dl8qHP%2Fuploads%2FQYWJaeKiD4RpqY7YC3P9%2Fscan_results2.PNG?alt=media&#x26;token=3fe6b355-94a0-4111-9fd1-d81436c6b913" alt=""><figcaption></figcaption></figure>

The second result found for this person takes us to:

```
https://linktr.ee/coleminerton
```

Let's go to this URL address:

<figure><img src="https://1764482864-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FsK05LA2NAjKs68dl8qHP%2Fuploads%2F2W40PklPR4Jo58oCknGL%2Fimage.png?alt=media&#x26;token=43c56752-034b-493d-a9f6-42bad2d8f5af" alt=""><figcaption></figcaption></figure>

The website appears to contain various social media and profiles of one person. After visiting the profile of Mastodon, we can see that we are on the right way because Cole posted that Kakuu Corporation allows for "unlimited" paid time off:

<figure><img src="https://1764482864-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FsK05LA2NAjKs68dl8qHP%2Fuploads%2FYmGYDdXNZe146gv3vIsn%2Fimage.png?alt=media&#x26;token=0f0d1e1b-9009-4f34-ad5e-943403cf9f30" alt="" width="439"><figcaption></figcaption></figure>

So let's keep looking for something interesting. On his YouTube channel we can find a link to the Discord server:

<figure><img src="https://1764482864-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FsK05LA2NAjKs68dl8qHP%2Fuploads%2FEOzjXTqDvF4ApWrZMtTK%2Fimage.png?alt=media&#x26;token=cadf3a69-1bfc-41d8-9f98-c2d5de31a863" alt="" width="467"><figcaption></figcaption></figure>

Let's join it. On the server text channel, we can find `trustly_contract.pdf` file:

<figure><img src="https://1764482864-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FsK05LA2NAjKs68dl8qHP%2Fuploads%2Ftttueo8Un676Noqj19Xb%2Fimage.png?alt=media&#x26;token=23832f41-6712-4e68-9cce-34d8ab28667f" alt="" width="488"><figcaption></figcaption></figure>

After downloading it and analysis we can find the flag in the text:

<figure><img src="https://1764482864-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FsK05LA2NAjKs68dl8qHP%2Fuploads%2FYXe48mZpWwIY85d0VGVS%2Fimage.png?alt=media&#x26;token=f0dd517c-bbde-47f9-bcf2-7013b2a1641b" alt="" width="542"><figcaption></figcaption></figure>

Flag:

```
utflag{discord_is_my_favorite_document_leaking_service}
```
