🔬
CTFs
  • 🚩nitrozeus's CTF Writeups
  • Tutorial
    • Install Windows 10 VM on M1 Mac
  • My Notes
    • Capture-The-Flag
      • Windows Forensics
      • Memory Forensics
      • Base32, Base64
      • Steganography
      • Email Analysis
      • Malware Analysis
      • MD4, MD5 Cracking
      • Social Engineering
      • OSINT
      • Google Dorking
      • Reconnaissance
      • Port Scan (nmap)
  • 2023
    • 🧠BrainHack CDDC 2023
      • Gallery
      • Eazy Network Analysis
      • What the hell happened to the PC?!
      • Audio Steganography
  • 2022
    • 🐱Grey Cat The Flag 2022
      • Parcel
      • Memory Game (Part 1)
      • Too Fast
      • Entry
      • Ghost
      • Firmware
      • Image Upload
      • flappy-js
    • ⛵STANDCON 2022
      • I Sea You (Part 1)
      • Locate Me
      • I Sea You (Part 2)
      • Trolley Trolling
      • A New Gateway
      • Walks like a cat, barks like a dog
      • Shark in the Ocean
      • Atlan Safe P1
      • Gift from Russia
      • Asmuth Shares
      • Memedump
      • Warmup Forensics
    • 🦁STACK the Flags 2022
      • Finding Nyan
      • New Task!
      • Hit you with that
      • Cobalt Struck
      • PyRunner
Powered by GitBook
On this page
  1. 2022
  2. STANDCON 2022

Locate Me

PreviousI Sea You (Part 1)NextI Sea You (Part 2)

Last updated 2 years ago

Sherlock is investigating a kidnapping case and managed to retrieve an image from the hard drive of a suspect. Could you help Sherlock find the location from this image? Once the location is determined, supply the to the compute_flag.py script and retrieve the flag.

This challenge gave us TWO files to work with;

  • compute_flag.py

  • locate_me.jpg

From the hint given, we have to somehow find the Plus Code, and in order to get the Plus Code, we have to first find the location.

We took a look at the .jpg file and there is nothing out of the ordinary. We suspected that this could be another form of Steganography! So, we used an online Steganography tool, called , that performs layer analysis on an image.

exiftool locate_me.jpg

Interestingly, there were a lot of metadata information given! GPS Position is what we took note of.

We took the Latitude(55.20) and Longitude(22.80) and searched it on Google Maps.

Flag: STANDCON22{b1620d104a494cde7591d48c7eef9a57}

Challenge Files

Unfortunately, there were nothing of interest.

We figured that since it is an image, maybe we should check out the metadata! We used to see the metadata results.

We copied the Plus Code and served it to the compute_flag.py and we got the flag!!!

⛵
😭
🎉
exiftool
Plus Code
Aperi'Solve
144B
compute_flag.py
524KB
locate_me.jpg
image
GPS Position!
Plus Code