TryHackMe Hackfinity Battle 2025: Task7 — Catch Me If You Can 2 | OSINT


osint ctf hackfinity tryhackme

TryHackMe Hackfinity Battle 2025: Task7 — Catch Me If You Can 2 | OSINT | CTF Writeup

Originally posted on my Medium page.


The Challenge

The task file is given below

Analyzing the Image

To begin, I closely examined the picture. To speed up my investigation, I performed a reverse image search on Google. This method helped me identify discrepancies between the challenge image and publicly available versions.

After carefully inspecting the results, I noticed one key difference — something inside a box stood out. This was likely the cipher text embedded in the image.

Identifying the Cipher

To determine what type of cipher was used, I searched for the extracted text on Google.

This led me to a known cipher format — pigpen that helped me decode the hidden message. After running it through a decoder (planetcalc)

I got the phrase as “MEET AT TORII PORTAL”.

So the place is “TORII PORTAL”

Extracting the Flag

Since CTF flags typically follow a structured format, I deduced that the flag must incorporate the keyword “torii portal” in some way. Following the TryHackMe flag format, I submitted:

THM{torii_portal}

And voilà! The flag was accepted, confirming the solution.


📖 Want more CTF and OSINT writeups like this? Check out my Medium page here.


Key Takeaways

  • Reverse image search is a powerful tool for identifying differences in challenge images.
  • Recognizing common cipher patterns can significantly speed up the decoding process.