Rating:

## Beginner/Beginner-menace

We have this image

![friend](https://github.com/zer00d4y/writeups/assets/128820441/4a154e7c-0c5b-41ff-bdfb-58e6d88635d8)

It's very easy and simple, just check meta data with exiftool or other exif tools

`exiftool friend.jpeg`

┌──(kali㉿kali)-[~/Downloads]
└─$ exiftool friend.jpeg
ExifTool Version Number : 12.67
File Name : friend.jpeg
Directory : .
File Size : 6.5 kB
File Modification Date/Time : 2023:12:15 09:26:43-05:00
File Access Date/Time : 2023:12:20 05:09:27-05:00
File Inode Change Date/Time : 2023:12:20 05:09:27-05:00
File Permissions : -rw-r--r--
File Type : JPEG
File Type Extension : jpg
MIME Type : image/jpeg
JFIF Version : 1.01
Exif Byte Order : Big-endian (Motorola, MM)
X Resolution : 1
Y Resolution : 1
Resolution Unit : None
Artist : flag{7h3_r34l_ctf_15_7h3_fr13nd5_w3_m4k3_al0ng}
Y Cb Cr Positioning : Centered
Image Width : 266
Image Height : 190
Encoding Process : Baseline DCT, Huffman coding
Bits Per Sample : 8
Color Components : 3
Y Cb Cr Sub Sampling : YCbCr4:2:0 (2 2)
Image Size : 266x190
Megapixels : 0.051

FLAG: `flag{7h3_r34l_ctf_15_7h3_fr13nd5_w3_m4k3_al0ng}`

Original writeup (https://github.com/zer00d4y/writeups/blob/main/CTF%20events/BackdoorCTF/BackdoorCTF_2023.md).