Midnight-Flag-Finals - Osint

Operation Silent Hunt Link to heading

Challenge Description Link to heading

During the theft of a hard drive containing sensitive data, the attacker made a mistake: they lost their phone at the scene.
Your mission: follow the clues and locate the exact address where the hard drive is hidden.

But be careful… getting caught could compromise the entire operation.

🔍 Only use the following websites for your investigation:

📱 Virtual Phone: https://message-app.midnightflag.fr/
🔐 Format of the flag: MCTF{housenumber_street_city} (all lowercase)
💡 Example: MCTF{66_rue_des_fleurs_paris}


Step 1: The Virtual Phone Link to heading

We start the challenge with a virtual phone that’s locked. To unlock it, we need to find the correct code.

Phone locked
Clue on screen

The first thing we notice is some information about an Instagram account. This could be a clue.

Instagram post
Instagram photos

Looking closely at the photos, we can spot patterns that could potentially be part of the phone’s unlock code.

More cat photos
Photos hint

Since the user seems emotionally attached to their cat, I noticed a date in one of the photos.

Cat with date

I tried using this as the unlock code:

020425

Lucily it worked — the phone is now unlocked!


Step 2: The Chat App Link to heading

As soon as we access the phone, a conversation appears.

Message received

I tried several inputs, and eventually, by choosing “I lost the website link”, I received a URL as a reply.

Link received

When we try to access the site, we’re asked for credentials. One of the questions is the name of the cat.

Login prompt

Luckily, we saw that earlier in the photos the user shared with Eloan FRANK. We can see the cat’s name there.

Cat’s name image 1
Cat’s name image 2

Using this, we successfully log in to the website where the hard drive was being sold.

Logged in


Step 3: Finding the Buyer Link to heading

While inspecting the site, I checked the JSON data loading the product and noticed the buyer’s nickname:

{
  id: 5,
  title: "External Hard Drive",
  description: "2TB external hard drive",
  price: 2e5,
  seller: "tech_seller",
  buyer: "Darkythedark42",
  deliveryDate: "22/06/2025 at 16:00",
  image: "/External_Hard_Drive.webp"
}

This led me to an X (Twitter) account:
https://x.com/Darkythedark42

The account only had one post:

X post

Trying to figure out the location, I noticed the first letters of a place name in the image.

Partial location clue

I ran a Google Reverse Image Search, and something looked familiar…

Suspicious result

We’re playing the CTF from Rennes, so it wouldn’t be surprising if the location were nearby.

Google Maps Rennes


Step 4: The Final Flag Link to heading

After matching the location on Google Maps, I finally found the street name and house number.

Flag:

MCTF{48_rue_de_saint-brieuc_rennes}