information
Name: information Description: Files can always be changed in a secret way. Can you find the flag? cat.jpg Author: susie Tags: Easy, Forensics, picoCTF 2021 Challenge from: picoCTF 2021 Files: cat.jpg Hints: 1. Look at the details of the file 2. Make sure to submit the flag as picoCTF{XXXXX}
Theory
According to the description, I'm not entirely sure about this, but this might be another challenge about getting metadata from images, so yeah, again this is a steganography challenge, we'll use stuff like exiftool or zsteg, but we'll see that after downloading the image, yay.
Solution
First, let's download the image:
shukularuni-picoctf@webshell:~$ wget https://mercury.picoctf.net/static/7cf6a33f90deeeac5c73407a1bdc99b6/cat.jpg --2025-04-26 16:52:21-- https://mercury.picoctf.net/static/7cf6a33f90deeeac5c73407a1bdc99b6/cat.jpg Resolving mercury.picoctf.net (mercury.picoctf.net)... 18.189.209.142 Connecting to mercury.picoctf.net (mercury.picoctf.net)|18.189.209.142|:443... connected. HTTP request sent, awaiting response... 200 OK Length: 878136 (858K) [application/octet-stream] Saving to: 'cat.jpg' cat.jpg 100%[=================================================================================================================================================================>] 857.55K 1.86MB/s in 0.5s 2025-04-26 16:52:21 (1.86 MB/s) - 'cat.jpg' saved [878136/878136] shukularuni-picoctf@webshell:~$ ls cat.jpg
Now let's see the metadata with exiftools if it's here somewhere:
shukularuni-picoctf@webshell:~$ exiftool cat.jpg ExifTool Version Number : 12.40 File Name : cat.jpg Directory : . File Size : 858 KiB File Modification Date/Time : 2021:03:15 18:24:46+00:00 File Access Date/Time : 2025:04:26 16:52:21+00:00 File Inode Change Date/Time : 2025:04:26 16:52:21+00:00 File Permissions : -rw-rw-r-- File Type : JPEG File Type Extension : jpg MIME Type : image/jpeg JFIF Version : 1.02 Resolution Unit : None X Resolution : 1 Y Resolution : 1 Current IPTC Digest : 7a78f3d9cfb1ce42ab5a3aa30573d617 Copyright Notice : PicoCTF Application Record Version : 4 XMP Toolkit : Image::ExifTool 10.80 License : cGljb0NURnt0aGVfbTN0YWRhdGFfMXNfbW9kaWZpZWR9 Rights : PicoCTF Image Width : 2560 Image Height : 1598 Encoding Process : Baseline DCT, Huffman coding Bits Per Sample : 8 Color Components : 3 Y Cb Cr Sub Sampling : YCbCr4:2:0 (2 2) Image Size : 2560x1598 Megapixels : 4.1
Yup, there it is! Base64 as usual, so let's just decode it with the Base64 decoder I always use:
BASE64 DECODE (Base64Decode.com) INPUT: cGljb0NURnt0aGVfbTN0YWRhdGFfMXNfbW9kaWZpZWR9 OUTPUT: picoCTF{the_m3tadata_1s_modified}
There we go! That's the flag.
I rated this level as "not good"! :(
https://play.picoctf.org/practice/challenge/408