picoCTF 2021 writeup - Information
'Information' is an easy forensic task.
Before we take a look at this challenge, i want to clear things up in case you don't know what forensics means.
What is forensics?
In a CTF/Hacking context, forensics can include:
- file format analysis
- steganography
- memory dump analysis
- network packet capture analysis
To explain be more precise: any challenge to examine and process a hidden piece of information out of static data files.
Getting information
When looking at the description, there already is a little hint.
Files can always be changed in a secret way.
We get to download a file called cat.jpg.
In my previous post, we changed the file extension of a php file to jpg.
So a good practice is to confirm obvious informations you have.
By using the file command (i don't know any windows equivalents to this) we get to see some metadata of our file
This command outputs all strings of the given file.
The image is pretty big (2560x1598) so there is a loot of data/strings to output.
0Photoshop 3.0
8BIM
PicoCTF
http://ns.adobe.com/xap/1.0/
<?xpacket begin='
' id='W5M0MpCehiHzreSzNTczkc9d'?>
<x:xmpmeta xmlns:x='adobe:ns:meta/' x:xmptk='Image::ExifTool 10.80'>
<rdf:RDF xmlns:rdf='http://www.w3.org/1999/02/22-rdf-syntax-ns#'>
<rdf:Description rdf:about=''
xmlns:cc='http://creativecommons.org/ns#'>
<cc:license rdf:resource='cGljb0NURnt0aGVfbTN0YWRhdGFfMXNfbW9kaWZpZWR9'/>
</rdf:Description>
<rdf:Description rdf:about=''
xmlns:dc='http://purl.org/dc/elements/1.1/'>
<dc:rights>
<rdf:Alt>
<rdf:li xml:lang='x-default'>PicoCTF</rdf:li>
</rdf:Alt>
</dc:rights>
</rdf:Description>
</rdf:RDF>
</x:xmpmeta>
hi MikeFox,
ReplyDeleteThanks for the it, got there by googling the base64 string (also didn't thought about decoding it as base64 ...), also my cat.jpg says :
xmlns:cc='http://creativemons.org/ns#'> (see the typo)