Blog
News

Redline Wins First Place at GrrCON 2024 OSINT CTF

By
Redline Cyber Security
Sep 30, 2024
3
min read
GrrCon Hacker Conference 2023 Car Hacking Village Capture The Flag

Redline Cyber Security is excited to announce that our pentesters secured first place at the 2024 GrrCON OSINT Capture the Flag (CTF) competition. With a record 68 teams competing, this year’s event focused on open-source intelligence gathering, and our team was honored to walk away with another victory, making this our third time winning the CTF over the years.

What is the OSINT CTF?

GrrCon OSINT CTF Information

The GrrCON OSINT CTF, organized by CG Silvers Consulting (<- awesome company), stands out from more technical challenges like the Car Hacking Village CTF, which we competed and took 2nd place in last year (See Blog Post: GrrCon 2023 CTF). The OSINT CTF emphasizes investigative and reconnaissance skills rather than technical hacking. Participants are tasked with using publicly available information to track down specific details about “volun-targets” using free online resources, all while adhering to strict ethical guidelines.

The goal is to leverage open-source tools to gather details about the targets, ranging from public social media profiles to obscure online aliases. Each flag represents a challenge that requires participants to methodically sift through data, cross-reference sources, and uncover the information needed to solve the challenge. The competition favors those with sharp research skills, creativity, and of course the "try harder" mentality.

Game Structure and Rules

The competition began with teams receiving a set of challenges, each task requiring them to uncover specific pieces of information about the volun-targets. Successfully discovering this information is what constituted capturing a 'flag.' The challenges varied in difficulty, with some involving straightforward searches, while others demanded more advanced investigative techniques.

The challenges ranged from uncovering details such as a target's spouse's full birthdate, their military rank, identifying their first-ever registered personal email address, and even discovering their high school mascot. These are often details that are used as security question's in online account recovery processes.

Participants were required to manage numerous browser tabs, searching through public people-search databases, social media platforms, and other sources of OSINT. It was critical to stay organized and manage the noise from the data that flooded in, making note-taking and source verification essential to success.

As with all GrrCON CTFs, ethical guidelines were strictly enforced. Participants could only use free, open-source tools and resources. Any use of paid services or private data was prohibited, ensuring that the competition remained a true test of OSINT skills.

Redline Cyber Security 2024 GrrCON OSINT CTF leaderboard

Redline’s Winning Strategy

Redlines pentesting team approached the competition with a clear focus and preparation, knowing that strong organization and a toolbar full of bookmarks to OSINT resources would be key.

Bryan, founder of Redline Cyber Security, shared his thoughts on the competition:
"This was a competition we had been looking forward to for a while. It gave us the perfect opportunity to brush up on non-technical reconnaissance skills that are crucial to any cybersecurity engagement. These OSINT techniques translate to any target and are common in the work we do."

The toughest flag involved discovering the legal middle name of one of the volun-targets. We managed to uncover the first name, middle initial, and last name from various sources but couldn’t submit the correct answer. Eventually, the team realized that the middle name was simply the letter itself—the middle initial was the entire middle name.

"The answer had been right in front of us the whole time!" Bryan said, reflecting on the challenge.

Effective note-taking and team communication were also essential to Redline’s victory. With dozens of browser tabs open and various people-search websites to comb through, it was important to filter out unnecessary noise and focus on key information. The team used Obsidian for note-taking and Signal to share links and updates, helping them efficiently manage the vast amount of data they collected.

Key OSINT Tools and Resources Used in the 2024 GrrCON OSINT CTF

Throughout the competition, a vast majority of the information we uncovered came from social media, particularly through the accounts of the targets' close friends and family. Interestingly, more details about the targets were revealed through their parents' social media accounts than through their own (THANKS Mom & Dad!).

While some resources proved helpful, others were not used, but it’s always good to have a broad set of tools available. Additionally, GitHub's Awesome OSINT list is a fantastic resource that maintains a large collection of OSINT tools for future reference.

Below are the key tools and websites we used, or considered, during the CTF:

Friday, Day 2 Schedule for GrrCon 2024 showing OSINT CTF Panel at 4PM

Reflections from the Winner’s Panel

OSINT CTF Winning Email Notification

After the competition, Redline's pentesters joined a panel discussion with the other top teams and two special guest volun-targets. Bryan and the team shared some insights into their experience and offered advice for future competitors:

  • Why did you decide to join the OSINT CTF?
    "We were excited for this event because it focuses on essential non-technical skills that are crucial for any cybersecurity engagement," Bryan explained. "We use these skills every day in our work, so it was a great opportunity to practice them in a fun and competitive environment."
  • What was the hardest flag to find?
    Bryan shared the story of the middle name challenge: "We found the first name, middle initial, and last name from various sources but missed that the middle initial was the full middle name. It was a real ‘aha’ moment when we figured that out!"
  • What advice would you have for future contestants?
    Bryan emphasized that the OSINT CTF is a great opportunity even for those without a technical background: "One of our team members competed in this type of event for the first time and did really well. Don’t limit yourself—form a team, dive in, and get your hands dirty."
Redline Team Members Bryan Smith and Mike Peck pictured above on stage during the GrrCON 2024 winner's panel.

A Big Shout Out to GrrCON and CG Silvers

We want to thank GrrCON and CG Silvers for organizing another outstanding event. It’s an honor to participate in the OSINT CTF year after year, and this year’s prizes—a black badge, Flipper Zero, and CG Silvers swag pack—were the perfect reward for our team’s efforts.

This years win at the GrrCON OSINT CTF reflects the value our pentesters put into teamwork, effective research, and attention to detail. As always, we’re excited to apply the same level of dedication to our work with clients.

For more information about how Redline Cyber Security can help secure your organization, contact us today!

Share this post: