Rating:
For a better view check our [githubpage](https://bsempir0x65.github.io/CTF_Writeups/VU_Cyberthon_2023/#find-location) or [github](https://github.com/bsempir0x65/CTF_Writeups/tree/main/VU_Cyberthon_2023#find-location) out
In the next one we got a pic and the goal to find the flag in the location of the pic.

You can see here an location in the pic, which probably should be the bait that you actually try to find that location which you see in the pic (# ̄ω ̄).
What we did was to use the tool [exiftool](https://exiftool.org/) to check the meta data of the pic which most of the time has a location information in it.
```console
└─$ exiftool *
ExifTool Version Number : 12.55
File Name : Location.jpeg
Directory : .
File Size : 253 kB
File Modification Date/Time : 2023:02:25 17:23:27+01:00
File Access Date/Time : 2023:02:25 17:23:27+01:00
File Inode Change Date/Time : 2023:02:25 17:23:27+01:00
File Permissions : -rw-r--r--
File Type : JPEG
File Type Extension : jpg
MIME Type : image/jpeg
JFIF Version : 1.01
Resolution Unit : None
X Resolution : 1
Y Resolution : 1
XMP Toolkit : FILE
Location : VU{d5bc0961009b25633293206cde4ca1e0}
Profile CMM Type :
Profile Version : 4.3.0
Profile Class : Display Device Profile
Color Space Data : RGB
Profile Connection Space : XYZ
Profile Date Time : 0000:00:00 00:00:00
Profile File Signature : acsp
Primary Platform : Unknown ()
CMM Flags : Not Embedded, Independent
```
Boom there it was already in plain text VU{d5bc0961009b25633293206cde4ca1e0}. Next points cashed in.