# Locate Me

> Sherlock is investigating a kidnapping case and managed to retrieve an image from the hard drive of a suspect. Could you help Sherlock find the location from this image? Once the location is determined, supply the [Plus Code](https://maps.google.com/pluscodes/) to the compute\_flag.py script and retrieve the flag.

This challenge gave us **TWO** files to work with;&#x20;

* compute\_flag.py
* locate\_me.jpg

From the hint given, we have to somehow find the Plus Code, and in order to get the Plus Code, we have to first find the location.&#x20;

We took a look at the `.jpg` file and there is nothing out of the ordinary. We suspected that this could be another form of Steganography! So, we used an online Steganography tool, called [Aperi'Solve](https://aperisolve.fr/), that performs layer analysis on an image.&#x20;

![](https://1326575018-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FWOW1TQuFBNIp3aDtWk3v%2Fuploads%2FlohiyKeH34w6rC4ZY64f%2Fimage.png?alt=media\&token=4b0af016-bddd-43bf-b069-66a03c4c9a09)

![](https://1326575018-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FWOW1TQuFBNIp3aDtWk3v%2Fuploads%2FMZUlAXvGVhLJv0XXzp0i%2Fimage.png?alt=media\&token=3b4925e6-ebb2-42f0-b317-dc5876532b75)

Unfortunately, there were nothing of interest. :sob:

We figured that since it is an image, maybe we should check out the metadata! We used [exiftool](https://www.poftut.com/how-to-install-and-use-exiftool-in-linux-windows-kali-ubuntu-mint-with-examples/) to see the metadata results.

![GPS Position!](https://1326575018-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FWOW1TQuFBNIp3aDtWk3v%2Fuploads%2FKt9LwoxacULKt64bQmI7%2Fimage.png?alt=media\&token=06fd7671-2cec-42e2-8cf9-42bbdfc351d0)

```bash
exiftool locate_me.jpg
```

Interestingly, there were a lot of metadata information given! **GPS** **Position** is what we took note of.&#x20;

We took the Latitude(`55.20`) and Longitude(`22.80`) and searched it on Google Maps.

![Plus Code](https://1326575018-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FWOW1TQuFBNIp3aDtWk3v%2Fuploads%2FQFOKcc3oD1EfapA8LNnw%2Fimage.png?alt=media\&token=e34bc80d-b339-444f-94d7-5bffb7f92609)

We copied the Plus Code and served it to the `compute_flag.py` and we got the flag!!! :tada:

![](https://1326575018-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FWOW1TQuFBNIp3aDtWk3v%2Fuploads%2FxGd8GAwMjRHwLrLKjrd5%2Fimage.png?alt=media\&token=ec1251b4-89cc-4042-a107-904ad2037e8b)

**Flag:** `STANDCON22{b1620d104a494cde7591d48c7eef9a57}`

## Challenge Files

{% file src="<https://1326575018-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FWOW1TQuFBNIp3aDtWk3v%2Fuploads%2FnYdSxEA4vlm1pBxMiwq0%2Fcompute_flag.py?alt=media&token=eb9f8577-8aa2-4fe9-bf70-54e17d86f533>" %}

{% file src="<https://1326575018-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FWOW1TQuFBNIp3aDtWk3v%2Fuploads%2F1INXcDd1WDBkvEZQgTES%2Flocate_me.jpg?alt=media&token=4342983e-fc85-4997-a34a-385e8ac64a6b>" %}
