PicoCTF – Hidden In Plain Sight
Challenge Author: Yahaya Meddy
Category: Forensics
Description
You’re given a seemingly ordinary JPG image. Something is tucked away out of sight inside the file. Your task is to discover the hidden payload and extract the flag.Download the jpg image here.
Process
- Download the image from the Pico website.
- The image appears to be a normal matrix-style image and does not visibly contain any information.
Next, I used ExifTool to examine the image metadata, which is often crucial in forensics CTFs.
1 2
# Extract metadata from the image exiftool img.jpgFrom the metadata, the most odd one looks the comment part which appeared to be encoded in an unknown format, lets look what type it is encoded using the “CyberChef”.
In the “CyberChef” website using the magic tool I found out that it was encoded using “base64” { You can also look at my cheat sheet to know various types of encoding} additionally the output was revealed as.
1 2
#Decoded Information steghide:cEF6endvcmQ=
This reveals additional clue which is the password for steghide (A tool for steganography) with the password which is again encoded in “base64”.
- Decoding with the base64 revealed the password which is -> {pAzzword} used for steghide tool.
Using the Steghide tool from the CLI to extract the hidden file.
1 2 3
#Using the steghide tool to extract the flag steghide --extract -sf img.jpg Enter Passphrase: pAzzword
The output shows that the file “flag.txt” has been extracted.
1 2
#Retrieveing the contents of the flag cat flag.txt
- Finally I got the flag for the hidden challenge.
1
picoCTF{h1dd3n_1n_1m4g3_f051f2e8}
Conclusion
This challenge demonstrates how important metadata analysis is in digital forensics. At first glance, the JPG image appeared completely ordinary, but a deeper inspection using exiftool revealed an unusual comment field. Decoding this metadata uncovered a hidden clue that ultimately led to the correct steghide passphrase.
By combining multiple forensic techniques—metadata extraction, encoding identification, base64 decoding, and steganographic analysis—the hidden payload was successfully extracted. This challenge reinforces a key lesson in CTF forensics: never trust what you see on the surface; valuable information is often hidden in plain sight.
Thank you for taking the time to read this write-up. I hope it clearly demonstrated the thought process, tools, and techniques used to solve this forensics challenge. Challenges like these highlight the importance of metadata analysis and steganography in CTFs.
Happy hacking, and see you in the next challenge 🚀🔍





