diff --git a/Metadata Forensics/BKFLAG.gpg b/Metadata Forensics/BKFLAG.gpg new file mode 100644 index 0000000..07a221a Binary files /dev/null and b/Metadata Forensics/BKFLAG.gpg differ diff --git a/Metadata Forensics/README.md b/Metadata Forensics/README.md new file mode 100644 index 0000000..9da45f6 --- /dev/null +++ b/Metadata Forensics/README.md @@ -0,0 +1,21 @@ + +# Metadata Forensics CTF + +**[Challenge (BKFLAG)]** + +Let's have a little throw back to 2012 when the bkfl image showed up on a little web forum back in the day. It has the metadata and GPS location in it still (Cartwheel76 and Zubes, thank you!). To complete this challenge, follow these guidelines (or don't, figure something else out that solidifies all this learning!) + +**1)** Head over to the gitea link (you're here, good job!) for this course and download the gpg file in addition to the BKFL photo. + +**2)** Use exiftool to determine what kind of phone took the photo + +**3)** Copy the phone model (ex. Oneplus 7 Pro) from exiftool and paste it into the gpg decrypt prompt when you run gpg on the encrypted file from the terminal in order to decrypt it and claim your prize of 1 hackerman cat photo, **YOU NEED GPG TO DO THIS!!** + +##### **sudo apt install gpg** + +##### **gpg BKFLAG.gpg** + + +**4)** Modify the phone model to a different model of phone (or just say something funny or mess with the cat photo's metadata in whatever way you want) + +**5)** Celebrate! You learned how to read and modify metadata for free! diff --git a/Metadata Forensics/bkfl.jpg b/Metadata Forensics/bkfl.jpg new file mode 100644 index 0000000..2248e7a Binary files /dev/null and b/Metadata Forensics/bkfl.jpg differ diff --git a/Metadata Forensics/placeholder.md b/Metadata Forensics/placeholder.md deleted file mode 100644 index 0ca2f41..0000000 --- a/Metadata Forensics/placeholder.md +++ /dev/null @@ -1 +0,0 @@ -placeholder text, expect labs in the future