Practical OSINT-riddles
Practical OSINT-riddles
Practical OSINT-riddles
2. I hide the source of a cyber attack, but with a little trace, I get found back. What am I?
3. I am the part of the email with invisible proof, that shows where it's been, aloof from the spoof. What
am I?
4. I store the time, date, and sender's place, a key to unlock a cyber chase. What part of an email am I?
5. I carry the sender’s address and more, revealing the one who opened the door. What part of an email
am I?
6. With X in my name, I trace the start, showing where the email began its part. What part of the header
am I?
Answer: X-Originating-IP
7. I'm the body, not just the face, holding text, links, and an attached case. What part of an email am I?
8. I’m the tool used to recover lost files, from devices hacked with ill-gotten wiles. What am I?
10. I am the real sender, hiding within, but email forensics will reveal my sin. What am I?
11. I hold attachments, plain text, and more, with the evidence you’re looking for. What part of the email
am I?
12. I show who’s meant to receive the mail, listed along with sender's trail. What part of the header am
I?
13. When spoofers try to fake and play, I show the true sender's way. What part of the email am I?
14. I scan devices from start to end, collecting evidence to help defend. What am I?
15. Hidden deep inside every mail, I reveal fraudsters without fail. What part of the email am I?
16. I record logs of every move, showing what the attacker had to prove. What am I?
Answer: Timestamp
18. I help recover data from a broken drive, bringing back what hackers strive to hide. What tool am I?
19. I track emails from server to server, revealing what spammers try to cover. What am I?
20. I carry secrets in plain sight, my metadata shows the fight. What am I?
21. I store passwords, browsing logs, and more, revealing the hacker’s score. What am I?
22. I help you find where an email starts, tracing it back like forensic arts. What am I?
23. I show the domain where the email was sent, revealing the scammer's intent. What part of the email
am I?
Answer: Smtp.mailfrom/header.From
24. I search for hidden text and clues, revealing what the email wants you to use. What tool am I?
25. I analyze email headers for phishing attacks, revealing where the real truth cracks. What am I?
Answer: Email header analysis
26. I reveal the location of the sender’s IP, giving the investigator the key. What am I?
27. I show emails in plain or coded form, but my format can cause a storm. What am I?
28. I investigate systems, files, and disks, collecting data and minimizing risks. What am I?
29. I protect your device from harm and attack, but forensics can find what hackers lack. What am I?
30. I show where the email was received, the final stop where the case is believed. What am I?
31. I reveal who sent the email fraud, exposing the one who played God. What part of the email am I?
32. I am a forensic analysis to find the fault, used to crack down on cyber assault. What am I?
33. I hide in attachments, malware too, but forensics will reveal my due. What am I?
35. I carry the signature of sender and time, helping investigators solve the crime. What part of the email
am I?
36. I analyze emails and track their way, finding clues in the words they say. What tool am I?
37. I store secrets that I won't tell, unless forensics breaks my shell. What am I?
38. I track where emails go and stop, showing servers until they drop. What am I?
39. I show the trail of emails received, with every step to be believed. What part of the header am I?
40. I reveal the hidden IP of the sender, giving clues for a digital defender. What part of the email am I?
Answer: X-Originating-IP
41. I help analyze emails, fake or true, revealing details from sender to you. What tool am I?
43. I carry the email’s source and path, showing clues in digital wrath. What am I?
44. I crack open files that once were lost, revealing secrets at any cost. What am I?
45. I reveal who a phishing email may claim, but my analysis shows the game. What am I?
46. I check the email to see if it’s true, verifying if it was really sent to you. What am I?
47. I scan the headers and dig for clues, exposing scammers who misuse. What tool am I?
48. I track the source of spam and lies, exposing the one who hides in disguise. What am I?
49. I search for clues in email time stamps, tracing back the criminal's tramps. What am I?