Hashcat and HashID changes

This commit is contained in:
Left4Code
2025-05-05 22:01:42 -04:00
parent 4d055f0712
commit 6a291e1aa6
8 changed files with 533 additions and 24 deletions

View File

@@ -94,19 +94,6 @@ Tag ID | Tag Name | Group | Writable
<h3 class="blog-header">Conclusion</h3>
<p>exiftool is such a massive utility that I obviously won't be able to cover everything it can do, but hopefully the exiftool.org forums and the man-pages will be enough for you to find what you need if it wasn't outlined here, but if you're doing forensics what I've written here is probably all you'll need for reading metadata for an investigation.</p>
<h3 class="blog-header">Challenge (BKFLAG)</h3>
<p>Let's have a little throw back to 2012 when <a href="https://archive.org/details/originalbkflimage">this fun image</a> showed up on a little web forum back in the day. It has the metadata and GPS location in it still (Cartwheel76 and Zubes, thank you!). To complete this challenge, follow these guidelines (or don't, figure something else out that solidifies all this learning!)</p>
<div style="white-space: pre-wrap">
<b>1)</b> Head over to the <a href=https://git.i2pd.xyz/Left4Code/L4C_Forensics_CTF/src/branch/master/Metadata%20Forensics>L4C Forensics Git Repository</a> for this course and download the gpg file in addition to the BKFL photo.
<b>2)</b> Use exiftool (and mat2 if you read the guide) to determine what kind of phone took the photo
<b>3)</b> Copy the phone exact model (ex. Oneplus 7 Pro) [The capitalization of the phone model matters!] from exiftool and paste it into the gpg decrypt prompt when you run gpg on the encrypted file from the terminal in order to decrypt it and claim your prize of 1 hackerman cat photo, YOU NEED GPG TO DO THIS!!
<pre class="preformatted">sudo apt install gpg</pre>
<pre class="preformatted">gpg BKFLAG.gpg</pre>
<b>4)</b> Modify the phone model to a different model of phone (or just say something funny or mess with the cat photo's metadata in whatever way you want)
</div>
</section>