Found the HACKER — OSINT CTF Walkthrough
CTF Overview & Initial Analysis
This challenge comes from the OSINT.Industries Christmas CTF, hosted by the osint.industries team on ctf.osint.industries. Like many of their tasks, it starts with almost nothing — a redacted forum URL, a timestamp, and a thread URI. No forum name, no archive link, no obvious username. The whole task is about reconstructing context purely from structure and historical breadcrumbs.
Step 1: Identifying the redacted forum
The first thing that stood out was the URL structure:
1 | /Thread-New-User-pass-40k-gmail-prmuim-netflix-hulu-steam-uplay-spotify |
That Thread-<title> pattern is extremely characteristic of MyBB. MyBB automatically converts thread titles into URL-safe slugs by replacing spaces with hyphens and stripping special characters.
So instead of guessing blindly, I narrowed the scope to popular MyBB-based underground cybercrime related forums active in 2018:
1 | raidforums |
Given the theme of the thread (combo lists, streaming accounts, mass credentials) and the time period, the most realistic candidate by far was RaidForums. It was the hub for this exact type of content in 2018.
From that point on, I treated the forum as raidforums.com.
Step 2: Reversing the thread title from the URI
Since MyBB slugs are derived directly from the thread title, the next move was to reverse-engineer what the original post title most likely looked like.
The URI suggests several realistic variants:
1 | New User pass 40k gmail prmuim netflix hulu steam uplay spotify |
All of these match common RaidForums naming conventions from that era — short, spammy, keyword-heavy titles optimized for attention.
Now I had:
- a forum (RaidForums)
- a likely thread title
- a precise timestamp (May 11, 2018 – 03:38 PM)
Step 3: Looking for archived traces
Next, I started checking archiving services for snapshots around May 2018.
Wayback Machine had an archive from May 12, 2018, but not May 11:
1 | http://web.archive.org/web/20180512110624/https://raidforums.com/ |
That snapshot included lists of active users from the last 24 hours. In theory, the thread author should be present there somewhere.
Unfortunately, the thread itself was never archived, and brute-forcing through user lists didn’t give a direct hit.
That’s when I discovered rf-archive.com.
At first glance, it looked completely dead. The site was not working. I assumed it was just another abandoned mirror — but I still decided to try pulling archived snapshots from it programmatically.
After hours of scraping (and fighting archive.org rate limits), I got nothing.
This CTF felt like I was hitting a wall over and over again. The obvious lead was rf-archive.com, which should have been the goldmine. I spent way too much time scraping archived snapshots from it, pulling Wayback URLs, parsing HTML, grepping for thread keywords — all of that — and got basically nothing useful. At that point, I almost dropped the challenge entirely.
Instead of brute-forcing the same thing again, I switched tactics
Step 4: Find where rf-archive actually lives
I went to fofa.com and searched for:
1 | body="raidforums" |
The idea was simple: anything hosting RaidForums-related content might expose mirrors, archives, or forgotten infrastructure. While digging through the results, I accidentally stumbled upon something interesting — the IP address behind rf-archive.com.
That’s when I decided to try a classic Host header trick.
1 | curl -H 'Host: rf-archive.com' https://153.92.7.145/ -k |
And…
boom.
The site loaded perfectly.

At that moment, it was clear that rf-archive.com itself wasn’t dead — DNS or routing was the problem. The server was still serving content if you talked to it directly.
Step 5: Search internally like a normal user (but better)
Now that I had access to the actual site, I fired up Burp. I set up Match & Replace rules to automatically inject the correct Host: rf-archive.com header into every request.
From there, I opened up Cracking - Combolist Removed Content and started looking for the thread mentioned in the challenge.

Finally - a username.
Step 6: Identify the thread author
The archived post showed the thread author username:
1 | RoNey |
That was the first confirmed identifier tied directly to the original post.
Step 7: Pivot to leaked data
With the username, the next step was obvious: check leaked forum databases.
I searched through RaidForums leaked database and found a matching record:
1 | (121435324,'RoNey', ... 'roneyads1@gmail.com', ... '17-12-1990', ...) |
And there it was.
Confirmed email address:
1 | roneyads1@gmail.com |
This is the point where the investigation really opens up.
Step 8: Email-based OSINT
I ran the email through osint.industries, and it returned a lot of linked data — accounts, reused usernames, platform traces.

From Linkedin Finder results, two major attributes were showing up:
- First name: Saad
- Country: Morocco
The first name appeared across multiple results.
Step 9: Final pivot — Twitter handle
The last missing piece was a Twitter handle. From osint.industries report, we see that the email is mentioned in Twitter breach.
Using breach.vip, I searched for that email. That led me straight to the handle:
1 | ii_ney |

At this point, everything lined up cleanly:
- Forum username
- Email address
- Real first name
- Country
- Twitter handle
Correct Flag
1 | OSINT{roneyads1@gmail.com-ii_ney-Morocco-Saad} |
Final thoughts
This challenge wasn’t about fancy tooling — it was about not trusting the obvious path and knowing when to pivot. The biggest breakthrough came from realizing the archive wasn’t gone, just badly exposed.
Host headers still save lives.
Thanks to the osint.industries team for this event! Hope to see more events like this in the feature.
Tools/resources i used for this CTF:
1 | fofa.com |