Difficulty
intermediate
Average duration
1 hrs
Technologies
linux
cybersecurity
blue-team
osint
investigation
Difficulty
intermediate
Average duration
1 hrs
Technologies
linux
cybersecurity
blue-team
osint
investigation
In this lab, you will apply real OSINT (Open Source Intelligence) techniques to track a potential digital attacker. It all starts with a simple clue: a username.
An individual using the alias johnclick1337
posted a phishing threat on a forum. The post was quickly deleted, but an investigator managed to record the username before it disappeared.
Your mission as a cybersecurity analyst is to track the suspect, investigate their public presence on the Internet, and find their personal email address.
In this lab you will learn:
👉 This challenge is solved from your browser, but the final validation is done inside the brokendb
virtual machine.
1https:/cybersecurity-machines/brokendb-lab.ova
student
.We know that johnclick1337
has reused their username on various public platforms. Only one contains their visible personal email, which they accidentally left on their profile.
Your task is to locate that real email address.
From your browser, go to the OSINT tool
Enter the name johnclick1337
and check which platforms have registered it.
Explore the public profiles on those platforms:
Carefully review their content: descriptions, README.md
, posts, comments…
One of them contains John's real email.
Flag validation. When you think you have found John Click's personal email address, validate it from the brokendb machine terminal.
Log in to the machine as student
.
Run the validator:
1validate-email
1Enter John Click's email: example@gmail.com
1✅ Correct flag! 2🎁 Flag: 4GEEKS{EXAMPLE_FLAG}
This challenge simulates a real case where a digital threat leaves subtle traces on the web. It's not just about searching, but about reading between the lines and connecting scattered profiles to form an identity.
Are you ready to think like a true intelligence analyst?
Good luck, Analyst!
Difficulty
intermediate
Average duration
1 hrs
Technologies
linux
cybersecurity
blue-team
osint
investigation
Difficulty
intermediate
Average duration
1 hrs
Technologies
linux
cybersecurity
blue-team
osint
investigation
Difficulty
intermediate
Average duration
1 hrs
Technologies
linux
cybersecurity
blue-team
osint
investigation
Difficulty
intermediate
Average duration
1 hrs
Technologies
linux
cybersecurity
blue-team
osint
investigation
Difficulty
intermediate
Average duration
1 hrs
Technologies
linux
cybersecurity
blue-team
osint
investigation
Difficulty
intermediate
Average duration
1 hrs
Technologies
linux
cybersecurity
blue-team
osint
investigation