Left4Code
69815dc3ef
|
3 weeks ago | |
---|---|---|
.. | ||
BKFLAG.gpg | 3 weeks ago | |
README.md | 3 weeks ago | |
bkfl.jpg | 3 weeks ago |
README.md
Metadata Forensics CTF
[Challenge (BKFLAG)]
Let's have a little throw back to 2012 when the bkfl image showed up on a little web forum back in the day. It has the metadata and GPS location in it still (Cartwheel76 and Zubes, thank you!). To complete this challenge, follow these guidelines (or don't, figure something else out that solidifies all this learning!)
1) Head over to the gitea link (you're here, good job!) for this course and download the gpg file in addition to the BKFL photo.
2) Use exiftool to determine what kind of phone took the photo
3) Copy the phone model (ex. Oneplus 7 Pro) from exiftool and paste it into the gpg decrypt prompt when you run gpg on the encrypted file from the terminal in order to decrypt it and claim your prize of 1 hackerman cat photo, YOU NEED GPG TO DO THIS!!
sudo apt install gpg
gpg BKFLAG.gpg
4) Modify the phone model to a different model of phone (or just say something funny or mess with the cat photo's metadata in whatever way you want)
5) Celebrate! You learned how to read and modify metadata for free!