Welcome back to yet onother OSINT investigation agent K. I did this hacktoria china-osint challenge and this is how i did it .

1.THE BEGINNING(ASSETS)

For the assets we will work with were given on the official hacktoria page and thats here https://hacktoria.com/#certifications

It was a certification challenge so lets get to it.

After unzipping the zip file given we found several zip files and in each zipfile to unclock the next you needed to get the previous answer correct because that was its password.

the unzipped assets

For the first one we were given this

Objective 1: Source identification

OBJECTIVE 1 — Source Identification

Using ONLY Chinese search terms, locate the blog distributing t00ls invitation codes. Search using Chinese characters only — no English, no pinyin. The forum name is t00ls. The Chinese term for invitation code is 邀请码. Your search will return multiple results. Verify by checking for active user engagement in comments and multiple pages of requests.

TO UNLOCK NEXT STEP ->   What is the top-level domain (TLD)? (English, no caps)

And the china osint began.

Investigation Steps:

  1. Search: Used the query t00ls 邀请码 to find blogs distributing invitation codes.

    the huidan tool blog

  2. Discovery: Identified 鬼仔’s Blog (huaidan.org) as a primary source.

    the look of the blog

  3. The answer: the answer we got it as we can see it has a .org domain extention ans there it was.TLD: org

    the answer the evidence

Objective 2: Target identification

The comments section spans multiple pages. Your target left their request in February 2017. Their message poetically references fate — meeting someone special in a vast sea of people. They requested a code from "鬼哥" (Brother Ghost).

Navigate to locate this specific comment. 

TO UNLOCK NEXT STEP ->   What is the full QQ email address they exposed? (English)
  1. Target Identification: Navigated through the comment pages of the post “赠送t00ls邀请码”.

    the chinese version before translation.

  2. Key Finding: On page 5 of the comments, a user named “偶遇” posted a comment in February 2017: “茫茫人海中遇到鬼哥,求鬼哥赐码。646891950@qq.com,感谢不尽!”

  3. After translation we had a clear english version we can go with if chinese if giving chills.

    the translated version

    4. Answer:

  • Email: 646891950@qq.com

Now Search. The target has used this same contact information elsewhere on the Chinese internet — specifically on a major Chinese Q&A platform similar to Yahoo Answers.

TO UNLOCK NEXT STEP ->   What is the name of this platform where you find their activity? (Chinese)

Goal: Identify where the same contact information appears on a Chinese Q&A platform.

Investigation Steps:

  1. Initial Search: Conducted a search for the email 646891950@qq.com on Chinese platforms and achives and lemme tell you this took a bit of time but all is well.**Disclaimer:**western search engines will not help here.

the baidu chinese version

  1. Discovery: Found the user active on 百度知道 (Baidu Zhidao), a major Chinese Q&A platform similar to Yahoo Answers. under the handle “带你看真实的世界”(Bring you to see the real world). In one specific answer, the user explicitly mentions the email `646891950@qq.com` while providing a file to another user

    the trasnslated  version

  2. Verification: The user has answered over 500 questions, often providing technical advice and occasionally mentioning their contact details.

Answer: 百度知道 (Baidu Zhidao)


Objective 4 : Profile Analysis (Location)

The target has answered over 500 questions on this platform. Their answers reveal extensive knowledge of a specific Chinese city — they discuss metro lines, districts, rental prices, local landmarks, and even which neighborhoods are cheaper. They mention working 12-hour days in a specific district.

TO UNLOCK NEXT STEP ->   Based on analyzing their answer history, what Chinese city does this person clearly live and work in? (English)

Goal: Determine the target’s city.

Investigation Steps:

  1. Location Analysis: The target provides detailed advice about renting in Binjiang District, Hangzhou. They mention specific neighborhoods like Puyan and Changhe, and landmarks like the Binjiang District Government.

    the hangzou location.

    2.Answer:City: Hangzhou (杭州)

Objective 5:Work Profile

In one of their answers, the target directly mentions their work situation — their district, salary, and hours. They also answer many technical questions about a specific field.

TO UNLOCK NEXT STEP ->   What professional field does this person work in? (Two letters, common abbreviation, English)

Goal: Identify the professional field of the target.

Investigation Steps:

  1. Technical Analysis: Reviewed the user’s technical answers. The user frequently answers questions related to:

    the it man

    • Programming: C language (e.g., Nankai University C language exam questions), C++, and Python.
    • System Administration: Linux commands (e.g., yum, httpd-tools).
    • Networking: Network engineering, network security, and server configuration.
  2. Self-Identification: In several answers, the user provides career advice for “software engineers” and “network engineers,” demonstrating professional-level knowledge in these areas.

    the it

  3. Abbreviation: The common two-letter abbreviation for this field is IT.

Answer: IT (Information Technology)


Objective 6: Infrastructure Pivot.QQ to Mobile

Now pivot from the QQ ID to a mobile number. The QQ ID can be extracted from the email format: [QQ_ID]@qq.com

SERPENT previously obtained partial infrastructure data from a Chinese OSINT operator during a joint signals operation. The following fragment was recovered from a seized asset list:

SOURCE: [__]SOV
STATUS: ACTIVE
ENDPOINT: [REDACTED]_tel.html
CAPABILITY: QQ ↔ MOBILE CORRELATION

Reconstruct the source domain and endpoint. The endpoint pattern is [PLATFORM]_tel.html where platform is a two-letter abbreviation.

TO UNLOCK NEXT STEP ->   What is the linked mobile number? (11 digits)

Goal: Correlate the QQ ID with a mobile number and Weibo UID using OSINT infrastructure.

Investigation Steps:

  1. QQ to Mobile: Using the QQ ID 646891950 on the OSINT mirror **sov.com, the linked mobile number was identified.

  2. we got the endpoint and this was it

    the endpoint

    then the number boom!! Mobile Number: 151580366**

objective 6

**Objective 7 :**Infrastructure Pivot.Mobile to Weibo

Using the same infrastructure, pivot from mobile number to Weibo identity. A secondary endpoint exists:

ENDPOINT: tel_[REDACTED].html
CAPABILITY: MOBILE ↔ WEIBO CORRELATION

The endpoint pattern is tel_[PLATFORM].html where platform is a two-letter abbreviation for the Chinese social media platform.

Input the mobile number. The tool may return multiple associated IDs. 

TO UNLOCK NEXT STEP ->   What is the Weibo-associated ID returned? (Only the 10 digits)
  1. Mobile to Weibo: Using the mobile number 15158036671, the linked Weibo UID was retrieved.

    the weibo gg

Answer:

  • Weibo UID: 16958256**

Objective 8 & 9: Verification and Cross-Reference

OBJECTIVE 8 — WeChat Verification

Use the mobile number to search for the associated WeChat account. WeChat allows searching users by phone number.

The WeChat profile displays a region. Can you verify that the data shown in the Baidu profile matches the one on WeChat?

TO UNLOCK NEXT STEP ->   What specific city is shown in their WeChat profile region? (English)







OBJECTIVE 9 — Cross-Reference Verification

You now have location data from three independent sources:

Their Q&A answers (mentioned city, districts, landmarks)
Mobile number prefix (indicates registration province)
WeChat profile region

The mobile number prefix 151 is assigned to China Mobile. The following digits 580 indicate Zhejiang province registration. Does all evidence point to the same location? 

TO UNLOCK NEXT STEP ->   What province does this person reside in? (English)

Goal: Verify the target’s region using WeChat and cross-reference all data points.

Investigation Steps:

  1. WeChat Lookup: Searching for the mobile number 15158036671 on WeChat(Use a Chinese number-attribution lookup indexed by Baidu.) reveals a profile with the region set to Hangzhou, Zhejiang.

china version

then we do a translate and we get this

the english version from we chat

  1. Cross-Reference:

    • Mobile Prefix: 151580 belongs to China Mobile in Zhejiang.
    • Baidu Zhidao: Content focuses on Hangzhou.
    • WeChat: Region confirms Hangzhou.
  2. Description: The mobile number was searched inside WeChat using the “search by phone number” feature.The WeChat profile displayed the region 浙江 杭州 (Zhejiang, Hangzhou). As WeChat profiles are not publicly linkable, the region was corroborated using Baidu’s public number-attribution service, which independently confirms the same province and city.

Answer:

  • 8: WeChat Region: Hangzhou
  • 9: Province: Zhejiang

OBJECTIVE 10 — Alternative Access

OBJECTIVE 10 — Alternative Access

Beyond invitation codes, t00ls has implemented an alternative access mechanism. Search for recent t00ls news in Chinese. The method involves blockchain technology and represents a monetization shift common among Chinese underground forums.

TO COMPLETE THE CTF ->   What blockchain-based method now provides access to t00ls forum? (3 letters, English, all caps)

Chinese news search (method)

Chinese search terms used (no English needed, but English appears in results naturally):

t00ls 区块链
t00ls 新 机制
t00ls NFT
t00ls 会员 区块链

From these sources, the new access model is:

  • Users

    purchase or hold a blockchain token

    Ownership of the token grants forum access The token is: transferable verifiable on-chain scarcity-controlled

This is not: -邀请码 (invite codes)

-积分 (points)

-充值卡 (top-up cards)

It is a Non-Fungible Token–based access control This mirrors monetization shifts across multiple Chinese grey-market communities since ~2022.

Objective Final: The certificate

Congratulations, Special Agent K.


You've successfully completed the assignment.


Follow the link, to get your certificate 


https:***************************************


You should receive a PDF within 10 minutes after submitting your details.


Do NOT share the link with anyone else, they haven't earned it. You have.


If you don't receive an email, ask around in the CTF-SUPPORT channel in the HACKTORIA Discord.


Again, well done, Special Agent K.

Discussion

Recent Chinese-language discussions and security community posts indicate that t00ls has shifted away from invitation-based access to a blockchain-based membership model. Access is now granted through ownership of a non-fungible token (NFT), a monetization approach increasingly adopted by Chinese underground forums. This shift is corroborated by discussions on 52pojie and reporting on FreeBuf.


Challenges Faced

  • Dead infrastructure: Several referenced OSINT tools were offline, requiring reliance on mirrors, caches, and reposted evidence.
  • Closed platforms: Key verification steps occurred inside WeChat, which offers no public URLs, necessitating external corroboration.
  • Chinese web bias: Western search engines and archives provided limited coverage, making native Chinese platforms essential.
  • Signal noise: Distinguishing real correlations from coincidence required cross-checking multiple independent sources.

Conclusion

This challenge highlights how effective Chinese OSINT depends less on tools and more on understanding ecosystem behavior. By following identifier reuse across blogs, Q&A platforms, telecom data, and closed social applications, a single invitation request was methodically expanded into a verified digital footprint. Dead infrastructure, mirrored tools, and closed platforms were not obstacles but signals, reinforcing a core OSINT truth: reliable attribution comes from converging independent evidence, not single sources.

In an ecosystem where links disappear, tools go dark, and platforms close their doors, OSINT is not about what you can click - it is about what you can connect.

When the data stops talking, methodology speaks.


Disclaimer

This write-up is intended for educational OSINT purposes only and uses publicly available information. No unauthorized access was performed. If you found it useful, feel free to share with proper attribution.


Happy Hunting.Correlate,then confirm!!!!