You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
22 lines
1.1 KiB
22 lines
1.1 KiB
3 weeks ago
|
|
||
|
# Metadata Forensics CTF
|
||
|
|
||
|
**[Challenge (BKFLAG)]**
|
||
|
|
||
|
Let's have a little throw back to 2012 when the bkfl image showed up on a little web forum back in the day. It has the metadata and GPS location in it still (Cartwheel76 and Zubes, thank you!). To complete this challenge, follow these guidelines (or don't, figure something else out that solidifies all this learning!)
|
||
|
|
||
|
**1)** Head over to the gitea link (you're here, good job!) for this course and download the gpg file in addition to the BKFL photo.
|
||
|
|
||
|
**2)** Use exiftool to determine what kind of phone took the photo
|
||
|
|
||
|
**3)** Copy the phone model (ex. Oneplus 7 Pro) from exiftool and paste it into the gpg decrypt prompt when you run gpg on the encrypted file from the terminal in order to decrypt it and claim your prize of 1 hackerman cat photo, **YOU NEED GPG TO DO THIS!!**
|
||
|
|
||
|
##### **sudo apt install gpg**
|
||
|
|
||
|
##### **gpg BKFLAG.gpg**
|
||
|
|
||
|
|
||
|
**4)** Modify the phone model to a different model of phone (or just say something funny or mess with the cat photo's metadata in whatever way you want)
|
||
|
|
||
|
**5)** Celebrate! You learned how to read and modify metadata for free!
|