Rating:

For a better view check our [githubpage](https://bsempir0x65.github.io/CTF_Writeups/VU_Cyberthon_2023/#find-location) or [github](https://github.com/bsempir0x65/CTF_Writeups/tree/main/VU_Cyberthon_2023#find-location) out

In the next one we got a pic and the goal to find the flag in the location of the pic.

![https://raw.githubusercontent.com/bsempir0x65/CTF_Writeups/main/VU_Cyberthon_2023/img/Location.jpeg](https://raw.githubusercontent.com/bsempir0x65/CTF_Writeups/main/VU_Cyberthon_2023/img/Location.jpeg)

You can see here an location in the pic, which probably should be the bait that you actually try to find that location which you see in the pic (# ̄ω ̄).
What we did was to use the tool [exiftool](https://exiftool.org/) to check the meta data of the pic which most of the time has a location information in it.

```console
└─$ exiftool *
ExifTool Version Number : 12.55
File Name : Location.jpeg
Directory : .
File Size : 253 kB
File Modification Date/Time : 2023:02:25 17:23:27+01:00
File Access Date/Time : 2023:02:25 17:23:27+01:00
File Inode Change Date/Time : 2023:02:25 17:23:27+01:00
File Permissions : -rw-r--r--
File Type : JPEG
File Type Extension : jpg
MIME Type : image/jpeg
JFIF Version : 1.01
Resolution Unit : None
X Resolution : 1
Y Resolution : 1
XMP Toolkit : FILE
Location : VU{d5bc0961009b25633293206cde4ca1e0}
Profile CMM Type :
Profile Version : 4.3.0
Profile Class : Display Device Profile
Color Space Data : RGB
Profile Connection Space : XYZ
Profile Date Time : 0000:00:00 00:00:00
Profile File Signature : acsp
Primary Platform : Unknown ()
CMM Flags : Not Embedded, Independent
```

Boom there it was already in plain text VU{d5bc0961009b25633293206cde4ca1e0}. Next points cashed in.

Original writeup (https://github.com/bsempir0x65/CTF_Writeups/tree/main/VU_Cyberthon_2023#find-location).