This will in the future contain many Linux Forensics CTF challenges that can be completed by using the skills learned in the digital forensics section of left4code.neocities.org
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
Left4Code 69815dc3ef added Metadata CTF 3 weeks ago
..
BKFLAG.gpg added Metadata CTF 3 weeks ago
README.md added Metadata CTF 3 weeks ago
bkfl.jpg added Metadata CTF 3 weeks ago

README.md

Metadata Forensics CTF

[Challenge (BKFLAG)]

Let's have a little throw back to 2012 when the bkfl image showed up on a little web forum back in the day. It has the metadata and GPS location in it still (Cartwheel76 and Zubes, thank you!). To complete this challenge, follow these guidelines (or don't, figure something else out that solidifies all this learning!)

1) Head over to the gitea link (you're here, good job!) for this course and download the gpg file in addition to the BKFL photo.

2) Use exiftool to determine what kind of phone took the photo

3) Copy the phone model (ex. Oneplus 7 Pro) from exiftool and paste it into the gpg decrypt prompt when you run gpg on the encrypted file from the terminal in order to decrypt it and claim your prize of 1 hackerman cat photo, YOU NEED GPG TO DO THIS!!

sudo apt install gpg
gpg BKFLAG.gpg

4) Modify the phone model to a different model of phone (or just say something funny or mess with the cat photo's metadata in whatever way you want)

5) Celebrate! You learned how to read and modify metadata for free!