Browse Source

added Metadata CTF

master
Left4Code 3 weeks ago
parent
commit
69815dc3ef
  1. BIN
      Metadata Forensics/BKFLAG.gpg
  2. 21
      Metadata Forensics/README.md
  3. BIN
      Metadata Forensics/bkfl.jpg
  4. 1
      Metadata Forensics/placeholder.md

BIN
Metadata Forensics/BKFLAG.gpg

Binary file not shown.

21
Metadata Forensics/README.md

@ -0,0 +1,21 @@ @@ -0,0 +1,21 @@
# Metadata Forensics CTF
**[Challenge (BKFLAG)]**
Let's have a little throw back to 2012 when the bkfl image showed up on a little web forum back in the day. It has the metadata and GPS location in it still (Cartwheel76 and Zubes, thank you!). To complete this challenge, follow these guidelines (or don't, figure something else out that solidifies all this learning!)
**1)** Head over to the gitea link (you're here, good job!) for this course and download the gpg file in addition to the BKFL photo.
**2)** Use exiftool to determine what kind of phone took the photo
**3)** Copy the phone model (ex. Oneplus 7 Pro) from exiftool and paste it into the gpg decrypt prompt when you run gpg on the encrypted file from the terminal in order to decrypt it and claim your prize of 1 hackerman cat photo, **YOU NEED GPG TO DO THIS!!**
##### **sudo apt install gpg**
##### **gpg BKFLAG.gpg**
**4)** Modify the phone model to a different model of phone (or just say something funny or mess with the cat photo's metadata in whatever way you want)
**5)** Celebrate! You learned how to read and modify metadata for free!

BIN
Metadata Forensics/bkfl.jpg

Binary file not shown.

After

Width:  |  Height:  |  Size: 292 KiB

1
Metadata Forensics/placeholder.md

@ -1 +0,0 @@ @@ -1 +0,0 @@
placeholder text, expect labs in the future
Loading…
Cancel
Save