TryHackMe Hackfinity Battle 2025: Task7 — Catch Me If You Can 2 | OSINT
osint ctf hackfinity tryhackme
TryHackMe Hackfinity Battle 2025: Task7 — Catch Me If You Can 2 | OSINT | CTF Writeup
Originally posted on my Medium page.
The Challenge

The task file is given below

Analyzing the Image
To begin, I closely examined the picture. To speed up my investigation, I performed a reverse image search on Google. This method helped me identify discrepancies between the challenge image and publicly available versions.

After carefully inspecting the results, I noticed one key difference — something inside a box stood out. This was likely the cipher text embedded in the image.

Identifying the Cipher
To determine what type of cipher was used, I searched for the extracted text on Google.

This led me to a known cipher format — pigpen that helped me decode the hidden message. After running it through a decoder (planetcalc)

I got the phrase as “MEET AT TORII PORTAL”.
So the place is “TORII PORTAL”
Extracting the Flag
Since CTF flags typically follow a structured format, I deduced that the flag must incorporate the keyword “torii portal” in some way. Following the TryHackMe flag format, I submitted:
THM{torii_portal}
And voilà! The flag was accepted, confirming the solution.
📖 Want more CTF and OSINT writeups like this? Check out my Medium page here.
Key Takeaways
- Reverse image search is a powerful tool for identifying differences in challenge images.
- Recognizing common cipher patterns can significantly speed up the decoding process.