🧠What I Practiced/Learned/Discovered
- Navigate/Analyze metadata
- Tested multiple metadata tools :
stat,ls -lexiftool - How to easily decode a base64 encoded string.
🔧 Tools used
Linux shell
catbase64exiftoolstatls
Steps
- Downloaded the PDF : https://challenge-files.picoctf.net/c_saffron_estate/3e53e18e2663d8818a300f0d3b56ae837b668a4798c5f5884d33b668a7257ce2/confidential.pdf
- Tried
cat FILE | grep picoCTF{but nothing - Saw in the description to look everything + Metadata :
Find the PDF file here [Hidden Confidential Document](https://challenge-files.picoctf.net/c_saffron_estate/3e53e18e2663d8818a300f0d3b56ae837b668a4798c5f5884d33b668a7257ce2/confidential.pdf) and uncover the flag within the metadata. - Tested
stat FILE - Tested
ls -l - Tested
exiftool FILE(And it gave me something)
- The Author name seemed weird because it’s base 64
- Run
echo "cGljb0NURntwdXp6bDNkX20zdGFkYXRhX2YwdW5kIV9jMjA3MzY2OX0=" | base64 -dand found the flag