Rating:

Players download an image.

![Image](https://github.com/Crypto-Cat/CTF/raw/main/ctf_events/2024/intigriti_24/osint/no_comment/images/0.jpg)

Could check for embedded files or stego, or perhaps do a reverse image lookup on Google or TinEye.

In fact, the title and description is a hint! If we check the image metadata (EXIF), we'll see a comment.

```bash
exiftool ripple.jpg
ExifTool Version Number : 12.57
File Name : ripple.jpg
Directory : .
File Size : 6.5 MB
File Modification Date/Time : 2024:09:21 15:51:46+01:00
File Access Date/Time : 2024:11:10 11:24:06+00:00
File Inode Change Date/Time : 2024:11:12 11:10:15+00:00
File Permissions : -rwxrw-rw-
File Type : JPEG
File Type Extension : jpg
MIME Type : image/jpeg
Comment : /a/pq6TgwS
Image Width : 4032
Image Height : 3024
Encoding Process : Baseline DCT, Huffman coding
Bits Per Sample : 8
Color Components : 3
Y Cb Cr Sub Sampling : YCbCr4:2:0 (2 2)
Image Size : 4032x3024
Megapixels : 12.2
```

Recognise the comment format? It's from Imgur, where [URLs are formatted](https://www.reddit.com/r/redditdev/comments/35bb7i/imgur_link_format) like `imgur.com/a/{alphanumeric}` (albums) and `imgur.com/g/{alphanumeric}` (galleries).

Let's visit the [imgur link](imgur.com/a/pq6TgwS) and see the same image, along with a comment.

```
V2hhdCBhICJsb25nX3N0cmFuZ2VfdHJpcCIgaXQncyBiZWVuIQoKaHR0cHM6Ly9wYXN0ZWJpbi5jb20vRmRjTFRxWWc=
```

We [base64 decode it..](<https://gchq.github.io/CyberChef/#recipe=From_Base64('A-Za-z0-9%2B/%3D',true,false)&input=VjJoaGRDQmhJQ0pzYjI1blgzTjBjbUZ1WjJWZmRISnBjQ0lnYVhRbmN5QmlaV1Z1SVFvS2FIUjBjSE02THk5d1lYTjBaV0pwYmk1amIyMHZSbVJqVEZSeFdXYz0>)

```
What a "long_strange_trip" it's been!

https://pastebin.com/FdcLTqYg
```

Visit the [pastebin link](https://pastebin.com/FdcLTqYg) and find a password protected note. Enter `long_strange_trip` to uncover a hex string.

Converting from hex [doesn't work](<https://gchq.github.io/CyberChef/#recipe=From_Hex('Auto')&input=MjUyMTNhMmUxODIxM2QyNjI4MTUwZTBiMmMwMDEzMGUwMjBkMDI0MDA0MzAxZTViMDAwNDBiMGI0YTFjNDMwYTMwMjMwNDA1MjMwNDA5NDMwOQ&oeol=VT>), so we check the users public pastes and find [this one..](https://pastebin.com/UavLs18i)

```
I've been learning all about cryptography recently, it's cool you can just XOR data with a password and nobody can recover it!!

I think I've learnt enough about that now, hopefully I'll learn something new in next weeks topic: https://specopssoft.com/blog/password-reuse-hidden-danger
```

Quite a hint, but at the last minute I worried this part was too guessy. We XOR the data with the same password and [get the flag](<https://gchq.github.io/CyberChef/#recipe=From_Hex('Auto')XOR(%7B'option':'Latin1','string':'long_strange_trip'%7D,'Standard',false)&input=MjUyMTNhMmUxODIxM2QyNjI4MTUwZTBiMmMwMDEzMGUwMjBkMDI0MDA0MzAxZTViMDAwNDBiMGI0YTFjNDMwYTMwMjMwNDA1MjMwNDA5NDMwOQ&oeol=VT>) :)

Flag: `INTIGRITI{instagram.com/reel/C7xYShjMcV0}`

Original writeup (https://crypto-cat.gitbook.io/ctf-writeups/2024/intigriti/osint/no_comment).