Pi Hediyem Var Cybersecurity Game #20

Since almost four years have passed, I’d like to provide a brief introduction to the Pi Hediyem Var cybersecurity game for new participants.

I decided to launch Pi Hediyem Var in 2015 for cybersecurity enthusiasts, professionals, and students. My main motivation was to gamify and anonymize real or potential cybersecurity incidents and challenges that experts might encounter. This way, participants can both test their knowledge and skills while also preparing for similar cases.

Thanks to the support of my sponsors, I have had the opportunity to reward university students with more than 15 Raspberry Pi computers through these games.

As with previous games, I will be giving away two Raspberry Pi 4 devices through a raffle to university students who successfully complete this game.

As for our game, our hero notices that the customers of a bank headquartered in Spain are being targeted by phishing attacks in Turkey. He decides to conduct a security investigation on these phishing sites. Realizing that the potential threat actor does not take Operations Security (OPSEC) seriously, our hero takes advantage of a mistake made by the actor and gains access to a Telegram account containing the actor’s first name, last name, and profile picture—thus, our story begins.

In order to answer the questions, you must first download the file from here.

By considering the photograph of the possible threat actor, answer the questions below;

  1. In which province, district, location and floor was it taken?
  2. How recent is it (it cannot be more recent than Y month of X year)?

Those who wish to have their name added to the list of successful participants and university students who want to enter the Raspberry Pi 4 raffle must submit their detailed solution path, along with proof (screenshots, etc.), their first and last name via the contact form or e-mail until Saturday, February 1 at 02:00 PM (EST).

A blog post detailing the solution to the game will be published at a later date, and the winners will be announced on this page and my X account.


Good luck!

Hediye Pi

Information belongs to those who see. Open sources speak, maps confirm.

image_pdfShow this post in PDF formatimage_printPrint this page
Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like
Read More

Antimeter Tool

Generally I prefer writing my articles in Turkish and I support my articles with proof of concept codes, videos and small tools. In my previous article, I created a small tool called antimeter which scans memory for detecting and also killing Metasploit’s meterpreter. I did not expect that much interest…
Read More
Read More

WhatsApp Scammers

Introduction I recently received my share of calls and messages from foreign cell phone numbers, disturbing almost everyone, especially in Turkey, who has used the WhatsApp application in recent days. Of course, as in my articles on other scams (Exposing Pig Butchering Scam, LinkedIn Scammers, Instagram Scammers), I rolled up…
Read More
Read More

New Job, New Me

It’s been quite a journey, after 10 long years filled with career successes and six promotions, I started my role as a Mid-Level Security Specialist at IBTech in June 2007. Just last week, I bid farewell to my position as Technical Leader. It turns out that leaving behind colleagues you’ve…
Read More