Practical OSINT-riddles

Download as rtf, pdf, or txt
Download as rtf, pdf, or txt
You are on page 1of 7

1. I reveal the tracks left in bytes and logs, clues hidden in files like digital fogs. What am I?

Answer: Digital Forensics

2. I hide the source of a cyber attack, but with a little trace, I get found back. What am I?

Answer: IP address (from email headers)

3. I am the part of the email with invisible proof, that shows where it's been, aloof from the spoof. What
am I?

Answer: Email header

4. I store the time, date, and sender's place, a key to unlock a cyber chase. What part of an email am I?

Answer: Date and time in the email header

5. I carry the sender’s address and more, revealing the one who opened the door. What part of an email
am I?

Answer: From field (sender email address)

6. With X in my name, I trace the start, showing where the email began its part. What part of the header
am I?

Answer: X-Originating-IP

7. I'm the body, not just the face, holding text, links, and an attached case. What part of an email am I?

Answer: Email body

8. I’m the tool used to recover lost files, from devices hacked with ill-gotten wiles. What am I?

Answer: Data recovery software


9. I carry the path where data flows, revealing email servers and where it goes. What part of an email am
I?

Answer: Email relay (SMTP servers)

10. I am the real sender, hiding within, but email forensics will reveal my sin. What am I?

Answer: Spoofed sender email

11. I hold attachments, plain text, and more, with the evidence you’re looking for. What part of the email
am I?

Answer: Email body

12. I show who’s meant to receive the mail, listed along with sender's trail. What part of the header am
I?

Answer: To field (recipient email)

13. When spoofers try to fake and play, I show the true sender's way. What part of the email am I?

Answer: Return-Path (Reply-To)

14. I scan devices from start to end, collecting evidence to help defend. What am I?

Answer: Digital forensic investigation tool

15. Hidden deep inside every mail, I reveal fraudsters without fail. What part of the email am I?

Answer: Email header

16. I record logs of every move, showing what the attacker had to prove. What am I?

Answer: Log file


17. I'm a time marker in digital space, showing when events took their place. What am I?

Answer: Timestamp

18. I help recover data from a broken drive, bringing back what hackers strive to hide. What tool am I?

Answer: Data recovery tool

19. I track emails from server to server, revealing what spammers try to cover. What am I?

Answer: Email header analysis

20. I carry secrets in plain sight, my metadata shows the fight. What am I?

Answer: Email metadata

21. I store passwords, browsing logs, and more, revealing the hacker’s score. What am I?

Answer: Browser cache

22. I help you find where an email starts, tracing it back like forensic arts. What am I?

Answer: Email trace

23. I show the domain where the email was sent, revealing the scammer's intent. What part of the email
am I?

Answer: Smtp.mailfrom/header.From

24. I search for hidden text and clues, revealing what the email wants you to use. What tool am I?

Answer: Email forensics tool

25. I analyze email headers for phishing attacks, revealing where the real truth cracks. What am I?
Answer: Email header analysis

26. I reveal the location of the sender’s IP, giving the investigator the key. What am I?

Answer: Reverse IP lookup

27. I show emails in plain or coded form, but my format can cause a storm. What am I?

Answer: Email encoding format

28. I investigate systems, files, and disks, collecting data and minimizing risks. What am I?

Answer: Digital forensic investigator

29. I protect your device from harm and attack, but forensics can find what hackers lack. What am I?

Answer: Antivirus software

30. I show where the email was received, the final stop where the case is believed. What am I?

Answer: Recipient’s IP address

31. I reveal who sent the email fraud, exposing the one who played God. What part of the email am I?

Answer: From field (sender's email)

32. I am a forensic analysis to find the fault, used to crack down on cyber assault. What am I?

Answer: Cyber forensics

33. I hide in attachments, malware too, but forensics will reveal my due. What am I?

Answer: Malicious attachment


34. I dig through servers, logs, and more, tracing emails from source to core. What am I?

Answer: Email server log analysis

35. I carry the signature of sender and time, helping investigators solve the crime. What part of the email
am I?

Answer: Digital signature

36. I analyze emails and track their way, finding clues in the words they say. What tool am I?

Answer: Email analysis tool

37. I store secrets that I won't tell, unless forensics breaks my shell. What am I?

Answer: Encrypted data

38. I track where emails go and stop, showing servers until they drop. What am I?

Answer: Email relay chain

39. I show the trail of emails received, with every step to be believed. What part of the header am I?

Answer: Received field

40. I reveal the hidden IP of the sender, giving clues for a digital defender. What part of the email am I?

Answer: X-Originating-IP

41. I help analyze emails, fake or true, revealing details from sender to you. What tool am I?

Answer: Email forensics software


42. I store deleted files in hidden space, forensics will uncover every trace. What am I?

Answer: Deleted file recovery

43. I carry the email’s source and path, showing clues in digital wrath. What am I?

Answer: Email header

44. I crack open files that once were lost, revealing secrets at any cost. What am I?

Answer: File recovery tool

45. I reveal who a phishing email may claim, but my analysis shows the game. What am I?

Answer: Phishing email analysis

46. I check the email to see if it’s true, verifying if it was really sent to you. What am I?

Answer: Email authentication

47. I scan the headers and dig for clues, exposing scammers who misuse. What tool am I?

Answer: Email header analyzer

48. I track the source of spam and lies, exposing the one who hides in disguise. What am I?

Answer: Email forensics

49. I search for clues in email time stamps, tracing back the criminal's tramps. What am I?

Answer: Timestamp analysis

50. I recover emails lost to time, uncovering evidence in a cybercrime. What am I?


Answer: Email recovery tool

You might also like