Skip to content

Write-up: TryHackMe - Dev Diaries

Published: at 12:00 AM

One of the most fascinating aspects of OSINT and security research is how much information can be uncovered simply by following digital breadcrumbs.

The TryHackMe “Dev Diaries” challenge is an OSINT and code forensics exercise where participants trace a developer’s digital footprint across different platforms.

Mapping the Domain

The journey began with subdomain enumeration. Using Subdomain Finder, I scanned the domain marvenly.com and uncovered two subdomains. Among them was a development environment (uat-testing.marvenly.com). Unfortunately, direct access wasn’t possible; it was locked down. I don’t know if it was on purpose.

image.png

The Wayback Machine

When doors are closed, archives often hold the key. Turning to the Wayback Machine, I found a snapshot of the UAT site:

image.png

image.png

From this, I extracted a username that became the next lead: notvibecoder23.

GitHub Recon

Searching for the username on GitHub revealed the developer’s profile. A single repository, the website, with commits and activity logs, all waiting to be explored.

I picked a random commit and appended .patch to the URL. This trick exposed the developer’s email address, hidden in the commit metadata: freelancedevbycoder23@gmail.com.

Git History

Now with only two questions left, I dug deeper into the git history. Commit messages and diffs revealed more personal and technical details about the developer’s workflow and oversights.

The second commit, 88baf1d, reveals to us why the project was abandoned: The project was marked as abandoned due to a payment dispute. And the third commit, about removing the signature, revealed the flag: THM{g1t_h1st0ry_n3v3r_f0rg3ts}.

Lessons Learned

This challenge highlights a crucial reality:

Operational security (OPSEC) isn’t just about servers. It’s about every trace left online.