CanYouSee
Name: CanYouSee Description: How about some hide and seek? Download this file here. Author: Mubarak Mikail Tags: Easy, Forensics, picoCTF 2024, browser_webshell_solvable Challenge from: picoCTF 2024 Files: unknown.zip Hints: 1. How can you view the information about the picture? 2. If something isn't in the expected form, maybe it deserves attention?
Theory
According to the description, there's really nothing that can give us a hint about what the challenge might be about. So let's see the hints, it seems we'll have to look for information inside a picture, sounds to me like this is a steganography challenge, so we'll use stuff like exiftool or zsteg, but we'll see that after downloading the file or image, whatever it is since it's inside a zip file.
Solution
Let's download the file and unzip it:
shukularuni-picoctf@webshell:~$ wget https://artifacts.picoctf.net/c_titan/128/unknown.zip --2025-04-26 16:51:14-- https://artifacts.picoctf.net/c_titan/128/unknown.zip Resolving artifacts.picoctf.net (artifacts.picoctf.net)... 3.160.22.16, 3.160.22.92, 3.160.22.43, ... Connecting to artifacts.picoctf.net (artifacts.picoctf.net)|3.160.22.16|:443... connected. HTTP request sent, awaiting response... 200 OK Length: 2252108 (2.1M) [application/octet-stream] Saving to: 'unknown.zip' unknown.zip 100%[=================================================================================================================================================================>] 2.15M 1.82MB/s in 1.2s 2025-04-26 16:51:15 (1.82 MB/s) - 'unknown.zip' saved [2252108/2252108] shukularuni-picoctf@webshell:~$ unzip unknown.zip Archive: unknown.zip inflating: ukn_reality.jpg shukularuni-picoctf@webshell:~$ ls ukn_reality.jpg unknown.zip
Alright so it is a picture, let's try exiftool first:
shukularuni-picoctf@webshell:~$ exiftool ukn_reality.jpg ExifTool Version Number : 12.40 File Name : ukn_reality.jpg Directory : . File Size : 2.2 MiB File Modification Date/Time : 2024:03:12 00:05:51+00:00 File Access Date/Time : 2024:03:12 00:05:51+00:00 File Inode Change Date/Time : 2025:04:26 16:51:25+00:00 File Permissions : -rw-r--r-- File Type : JPEG File Type Extension : jpg MIME Type : image/jpeg JFIF Version : 1.01 Resolution Unit : inches X Resolution : 72 Y Resolution : 72 XMP Toolkit : Image::ExifTool 11.88 Attribution URL : cGljb0NURntNRTc0RDQ3QV9ISUREM05fM2I5MjA5YTJ9Cg== Image Width : 4308 Image Height : 2875 Encoding Process : Baseline DCT, Huffman coding Bits Per Sample : 8 Color Components : 3 Y Cb Cr Sub Sampling : YCbCr4:2:0 (2 2) Image Size : 4308x2875 Megapixels : 12.4
Okay, there it is! A Base64 string in the middle of the file metadata, a usual. Now let's just decode it with the Base64 decoder I always use:
BASE64 DECODE (Base64Decode.com) INPUT: cGljb0NURntNRTc0RDQ3QV9ISUREM05fM2I5MjA5YTJ9Cg== OUTPUT: picoCTF{ME74D47A_HIDD3N_3b9209a2}
There we go! That's the flag.
I rated this level as "good"! :3
https://play.picoctf.org/practice/challenge/408