ch1se
  • Home
  • CERTIFICATES AND PARTICIPATIONS
    • HackTheBox - Cyber Apocalypse CTF 2025: Tales from Eldoria
    • The SecOps Group
  • bitsctf-2025-writeups
    • HotPause
  • BRONCOCTF-2025-WRITEUPS
    • theflagishere!
  • ACECTF-2025-WRITEUPS
    • The Mysterious Building
    • Social Circles
    • Broken Secrets
    • Cryptic Pixels
    • Tabs&Spaces
  • PEARLCTF-2025-WRITEUPS
    • Hidden Marker
    • SentMail
    • Van Gogh's GARBAGE hunt
  • 1753CTF-2025-WRITEUPS
    • Dude where is my car
    • Happy New Year!
    • Somewhere in Space
  • CITCTF-2025-WRITEUPS
    • Timesink
    • Throwback to the Future
    • No Country for Old Keys
  • BYUCTF-2025
    • Universal-ty
  • OSINT-WRITEUPS
    • gralhix
Powered by GitBook
On this page
  • Introduction
  • Steps
  • Step 1: Checking the YouTube Channel
  • Step 2: Inspecting the Video for Clues
  • Step 3: Translating the Hidden Text
  • Step 4: Tracking the Username with Sherlock
  • Step 5: Finding the Account on Smule
  • Step 6: Extracting the Final Flag
  • FLAG
  1. ACECTF-2025-WRITEUPS

Social Circles

CATEGORY - OSINT

PreviousThe Mysterious BuildingNextBroken Secrets

Last updated 3 months ago

Introduction

This OSINT challenge provides a username and instructs us to follow them on YouTube. Our goal is to track the user across different platforms and extract the hidden flag.

Steps

Step 1: Checking the YouTube Channel

The challenge provides the username:

AhjussiPlayz

So, I searched for this YouTube channel and found that it had only one video uploaded. Since it was the only available content, it was likely where the flag was hidden.

Step 2: Inspecting the Video for Clues

I played the video, and at first, nothing seemed unusual. However, I noticed that a transcript was available, suggesting that closed captions (CC) were present.

Checking the English CC revealed nothing.

I then switched to Korean CC, and this was where I found something interesting.

Step 3: Translating the Hidden Text

I used Google Translate to translate the Korean subtitles.

It revealed a new username:

wimebix884

This was an important lead, so I decided to search for this username across different platforms.

Step 4: Tracking the Username with Sherlock

I used Sherlock, a Kali Linux CLI tool for username enumeration, to find accounts associated with wimebix884.

Sherlock found multiple results, so I manually checked seven links one by one.

Step 5: Finding the Account on Smule

One of the results led me to this Smule profile:

Under the Songs tab, I noticed an attachment named "Flag Debaucher". This looked suspicious, so I clicked on it.

Step 6: Extracting the Final Flag

The Smule attachment contained a Google Drive link:

I played the audio file uploaded to Google Drive and successfully extracted the flag.

FLAG

ACECTF{mu171m3d14_f146}

🔗

🔗

https://www.smule.com/wimebix884
https://drive.google.com/file/d/1093uvDYSVWke8ze2jdgJ1rVehz51Jx00