FlaGPT
MediumOpen Source Cyber Intelligence
Overview
Heart huntin, they claim to be the most dangerous group known to mankind, they recently adopted the AI trend and started training their evil model. They made the silly mistake of generating their profile with their AI and we captured it. Can you go after them and find their evil plans?
flag format: FLAG{}
Lab Details
Prerequisites & Requirements
- Linux Command-Line: Basic familiarity with Linux command-line operations and file navigation.
What will you learn?
- AI Provenance Verification: Understand how AI-generated images are cryptographically signed by their originating models to establish authenticity.
- Certificate Extraction: Learn how to extract and decode embedded X.509 certificates from C2PA metadata to uncover hidden creator information (like email addresses).
- OSINT Pivoting: Apply open-source intelligence techniques to pivot from extracted metadata to live social media profiles using username enumeration.
Tools
- ExifTool: A command-line utility for reading and analyzing deep file metadata.
- c2patool: A command-line tool used to display, verify, and extract C2PA (Coalition for Content Provenance and Authenticity) manifest data and certificate chains.
Job Positions
Ethical Hacker