What can we see?
- We can recognise the road signs, we are in the US.
- The building looks like NYC but it just a wild guess
- The store is in a corner
- We can read the store sign: "Hardware *umber store"
- The store sign is also in Chinese. Maybe chinatown?
Just type "Hardware *umber store" in Google. Ok, the missing letter is an l.
Correct the query to "Hardware lumber store". Interesting, the first city suggested by Google is NYC. So let's try: "Hardware lumber store" chinatown NYC
We only have 3 results. But remember, our store is in a corner and the road is quite large.
Just at looking the small map preview we can say that our store is probably "Mikco Building Materials"
Click on it. Yep the photo of the store seems to match
Copy paste the store address on Google Maps. Bingo! That's the place.
You found the solution in 4 clicks.
Pro tip: Before jumping to your favorite tools, look at what your have, understand it
Thanks @OSINTDojo for the challenge! One day I need to understand how your badge system is working 😅
• • •
Missing some Tweet in this thread? You can try to
force a refresh
- Yes, we have identified the correct individual, and he is aware of it. He has attempted to delete evidence since the publication of the tweet.
- Again, it’s not a one-man job. We have also identified the other members of the team.
- They are aware of it. They sent 500 million requests to predictasearch.com over the last three days.
- Trust the process. A report has been sent to the concerned authorities, and they will do their excellent work as usual.
They created a new Telegram channel. The last post they forwarded is from a channel called "Russian Partisan." This is not surprising according to our initial findings.
I've identified the people responsible for the DDoS attack on X yesterday. I'm currently in Washington and will be at the Eisenhower Building tomorrow (for another matter). Would you be interested in meeting?
In the meantime, let me explain
It's OSINT time!
@elonmusk Yesterday, a group called "Dark Storm Team" claimed responsibility for a DDoS attack on Twitter.
Their leader, MRHELL112 on Telegram, has previously used usernames like Darkcrr, GLITCHAT1, and GLITCHcracker.
@elonmusk In a Telegram channel about "DDoS Attack Services," DrSinaway is mentioned alongside Darkcrr.
DrSinaway’s TG bio also references a group called CyberSorcerers.
Après avoir dit que le texte est trop large un tweet plus haut on parle “des services” ? Il n’y avait pas un mot plus large dans le dictionnaire de la French Tech ?
Non il n’y a pas de backdoor qui respecte les libertés et la vie privée. C’est un MENSONGE.