Introduction#
Hey everyone 👋 — In this Capture The Flag (CTF), we are given a task to find the hidden payload in a file and extract the flag.

Image#
Downloading the file, we can see that it appears to be normal.

If you’re on Linux, you can run sudo apt install exiftool or use an online EXIF viewer to check the metadata.

It gives a comment which looks like a base64 string.
c3RlZ2hpZGU6Y0VGNmVuZHZjbVE9Using an online Base64 decoder, it returns a string with the name of steghide and another base64 string.

steghide:cEF6endvcmQ=Decoding the content, cEF6endvcmQ=, returns the string, pAzzword.

Steghide#
The string in the comment, steghide, is actually a tool used to hide text in images. You can learn more about it here. I’m using Linux so I’ll run the command to install it which is:
sudo apt install steghideWe can then use it to extract the text using:
steghide extract -sf img.jpgYou can enter the flag previous string which is pAzzword.

Flag 🚩#

picoCTF{h1dd3n_1n_1m4g3_67479645}

