Back to writeups

[MISC] findme v2 — GlacierCTF 2025

Platform: GlacierCTF Category: MISC Techniques: PDF Analysis / Metadata / File Carving Tools: exiftool, binwalk Difficulty: Easy

Summary

The challenge consisted of a single PDF file containing hidden embedded data. After reviewing its metadata with exiftool and carving it with binwalk, a PNG image was found inside. This image contained the challenge flag.

gctf{WH4T_Y0U_D0NT_CH4NG3_Y0U_CH00S3}

Provided File

The challenge included one file named chall.pdf. Nothing in the PDF preview hinted at the flag.

PDF preview screenshot

Step 1 — Checking Metadata

I started by inspecting the PDF metadata with exiftool to look for unusual fields or embedded references.

exiftool chall.pdf
Exiftool output screenshot

No meaningful metadata appeared, but it confirmed that nothing obvious was stored in metadata fields.

Step 2 — Extracting Embedded Files

I used binwalk to analyze the structure of the PDF and extract any embedded content.

binwalk chall.pdf
Binwalk extraction screenshot

Binwalk created an extraction directory named _chall.pdf.extracted/, which contained several files.

Step 3 — Reviewing Extracted Files

ls -la _chall.pdf.extracted    and    file *

Directory listing screenshot

One of the extracted files was a PNG image, which stood out compared to the others.

Step 4 — Opening the PNG

Opening the PNG revealed the flag directly inside the image.

Hidden PNG containing the flag

The submission was accepted without issues:

Flag submission screenshot
gctf{WH4T_Y0U_D0NT_CH4NG3_Y0U_CH00S3}

Lessons Learned

  • PDF files often contain embedded objects beyond simple text and images.
  • exiftool is useful for quick metadata checks but not always enough.
  • binwalk is highly effective for carving and identifying hidden content.
  • MISC challenges frequently rely on inspecting file internals rather than complex exploitation.