Intro to Chinese OSINT

Intro to Chinese OSINT

Our signals intelligence specialist, Oriana, intercepted unusual traffic patterns originating from Chinese digital sources. Multiple sites appear to be distributing invitation codes for t00ls — one of China's hacking forums. The codes themselves are not our concern.

What matters is the trail left behind by those publicly asking for access. In the comments sections, individuals have exposed their contact information, unaware they've created a chain of digital breadcrumbs spanning the entire Chinese internet ecosystem.

One such individual caught our attention. We believe they may be connected to a larger network, but we need you to confirm their real identity and location before we can proceed.

Complication: The target did not just leave an email address. They have an extensive digital footprint across Chinese platforms — answering questions, revealing their profession, their daily commute, their neighborhood.

Every answer they gave was another breadcrumb.

Your mission:

- Locate the correct source distributing invitation codes

- Identify the target contact from the comments

- Trace the QQ email to additional platforms

- Build a profile from their public activity

- Pivot across platforms:

QQ → Mobile → Weibo → WeChat

- Confirm the subject's physical location and work area

This operation will test your ability to navigate China's unique digital landscape — platforms, tools, and techniques that most Western analysts often encounter during China focused investigations.

You will need to verify, cross-reference, and think critically every step of the way.

As always, Special Agent. The assignment is yours, if you choose to accept.

Download the materials


Answer Instruction

Each ZIP archive is unlocked with the answer to the previous objective. When you unlock the last objective, you get a link to the certification form. Fill out that form with the information you want on it. Don't give the link to other people.

Credits for making this certification: Eva Prokofiev, from EPCYBER