picoCTF information — ForensicsChallenge Challenge- Walkthrough
This challenge involves analysing an image file and uncover hidden information embedded within it.
Site URL: https://play.picoctf.org/practice/challenge/186?category=4&difficulty=1&page=1&search=
Description
Files can always be changed in a secret way. Can you find the flag? cat.jpg
Hints
- Look at the details of the file
- Make sure to submit the flag as picoCTF{XXXXX}
Solution
Download the File by Clicking on the link provided in the challenge and download the given file.
Open PowerShell and navigate to the Downloads folder
cd ~/Downloads
Locate the Most Recently Modified File
Get-ChildItem | Sort-Object LastWriteTime -Descending | Select-Object -First 1
Examine the File Metadata using ExifTool
a command-line tool used to read, write, and edit metadata in images, videos, and other media files.
ExifTool is often used in digital forensics to extract metadata from images, which may contain hidden information such as GPS coordinates, timestamps, or embedded messa
exiftool cat.jpg
From the ExifTool output, I see some interesting metadata fields, particularly:
- Copyright Notice: PicoCTF
- License: cGljb0NURnt0aGVfbTN0YWRhdGFfMXNfbW9kaWZpZWR9 (which appears to be Base64-encoded)
Decoded Base64 string using CyberChef
https://gchq.github.io/CyberChef/
Flag: picoCTF{the_m3tadata_1s_modified}
Final Thoughts
This challenge provided a valuable opportunity to apply practical cybersecurity skills in metadata analysis, Base64 decoding, and forensic investigation — key techniques used in real-world digital forensics and Capture The Flag (CTF) competitions.
By following a structured methodology, we successfully:
- Downloaded and analyzed the given file.
- Verified the file type and metadata using PowerShell and ExifTool.
- Discovered an embedded Base64-encoded string in the image metadata.
- Decoded the Base64 string to reveal the hidden flag.
This challenge highlights the significance of metadata in digital forensics. Sensitive information is often stored within metadata fields, and attackers may use it to embed malicious data or exfiltrate information covertly. Understanding how to extract and analyze metadata is crucial for cybersecurity professionals, as it plays a role in threat hunting, malware analysis, and forensic investigations.
Key Takeaway
In cybersecurity, information is often hidden in plain sight. Metadata, file properties, and encodings can contain valuable clues that lead to crucial discoveries. Whether investigating digital forensics cases, analyzing malware, or participating in CTFs, knowing how to uncover hidden data is an essential skill.
Stay curious, question everything, and always dig deeper — because in cybersecurity, the details often hold the key to the solution.