Found Key Hidden in JPEG File
Today, solved the picoGym ethical hacking challenge titled Information, which challenged users to find a picoCTF key hidden in a JPEG image file. But decided to respectfully tech-splain or summarize instead of blatantly giving away detailed spoilers.
The JPEG image features a kitten which appeared to have commandeered a laptop computer, but failed to hack it using redundant code.
On My Local Machine
Next time: may try to git-clone exiftool/exiftool from github.com, desiring to use it locally in the future.
Using the picoCTF Webshell
Recommended by LinkedIn
exiftool (update)
Above I mentioned cloning the exiftool repo from github.com. Well, I tried it and it worked on my machine locally, so I may follow up with a short script that returns the picoCTF key solution—perhaps a gist link.
nick3499/find-hidden-key-cat-jpg.sh (update)
I wrote a three-line script that returns the picoCTF key. After first using wget to download cat.jpg to the local machine, then grepping the line with that base64 hash, then isolating the hash and passing it to base64 --decode.
The new shell script is linked below: