osintfreeeasy

The Puppet Master

hackthebox

Task: OSINT challenge requiring investigation of a React web app to identify military equipment. Solution: Extract hidden image URL from JS source code, identify Bushmaster vehicle from NZDF website, gather technical specifications.

$ ls tags/ techniques/
source_code_analysisimage_reverse_searchtechnical_spec_lookup

$ cat /etc/rate-limit

Rate limit reached (20 reads/hour per IP). Showing preview only — full content returns at the next hour roll-over.

The Puppet Master — HackTheBox

Description

The Puppet Master is an OSINT challenge that requires conducting an investigation based on data found in a web application and identifying military equipment.

Analysis

  1. Upon examining the challenge website, it was discovered that it is built on React.
  2. In the JavaScript source code (via DevTools), a direct link to an image used in the application was found: https://www.nzdf.mil.nz/assets/Uploads/BannerImages/20230525_NZDF_P1061532_025__FocusFillWyIwLjAwIiwiMC4wMCIsNjAwLDQwMF0.JPG
  3. The link leads to the official New Zealand Defence Force (NZDF) website.

Solution

Step 1: Vehicle Identification

The image shows an armored vehicle. Searching the NZDF website and visual comparison allowed identification of it as the Bushmaster Protected Mobility Vehicle (NZ5.5 variant), used by NZDF.

...

$ grep --similar

Similar writeups