ch1se
  • Home
  • CERTIFICATES AND PARTICIPATIONS
    • HackTheBox - Cyber Apocalypse CTF 2025: Tales from Eldoria
    • The SecOps Group
  • bitsctf-2025-writeups
    • HotPause
  • BRONCOCTF-2025-WRITEUPS
    • theflagishere!
  • ACECTF-2025-WRITEUPS
    • The Mysterious Building
    • Social Circles
    • Broken Secrets
    • Cryptic Pixels
    • Tabs&Spaces
  • PEARLCTF-2025-WRITEUPS
    • Hidden Marker
    • SentMail
    • Van Gogh's GARBAGE hunt
  • 1753CTF-2025-WRITEUPS
    • Dude where is my car
    • Happy New Year!
    • Somewhere in Space
  • CITCTF-2025-WRITEUPS
    • Timesink
    • Throwback to the Future
    • No Country for Old Keys
  • BYUCTF-2025
    • Universal-ty
  • OSINT-WRITEUPS
    • gralhix
Powered by GitBook
On this page
  • Challenge Description
  • Provided Image
  • Step 1: Checking Metadata
  • Step 2: Reverse Image Search
  • Step 3: Analyzing Visual Clues
  • Step 4: Exploring the Site
  • Step 5: Extracting the Flag
  • Step 6: Submitting the Flag
  • Final Flag
  1. 1753CTF-2025-WRITEUPS

Dude where is my car

OSINT

PreviousVan Gogh's GARBAGE huntNextHappy New Year!

Last updated 1 month ago


Challenge Description

I'm not sure where I lost my car, but I believe I’ll remember if I can see the original photo again. Can you find it? I only have this photoshopped and cropped version, but I’m confident it contains enough information for an OSINT expert. To prove your success, submit a flag with the Build Number from the EXIF data in the format: 1753c{Build Number}.


Provided Image


Step 1: Checking Metadata

I used exiftool to examine the metadata of the provided image:

exiftool dude-where-is-my_car.jpg

Output (trimmed):

...
File Name                       : dude-where-is-my_car.jpg
File Size                       : 1828 kB
Image Size                      : 2132x2040
MIME Type                       : image/jpeg
...

Unfortunately, no useful EXIF data (like GPS or device info) was found.


Step 2: Reverse Image Search

I uploaded the image to Google Image Search.

After skimming through the results, nothing matched exactly. So, I analyzed the image further myself.


Step 3: Analyzing Visual Clues

While inspecting the image, I spotted a URL on the license plate:

www.lieberzupiper.de

Visiting the URL directly didn’t work (domain is offline), so I searched for lieberzupiper de on Google.

Bingo! I found a listing on:

https://tablica-rejestracyjna.pl/WWY?p=373

Unfortunately, it didn’t have the full original image either.


Step 4: Exploring the Site

I clicked on "Więcej komentarzy »", which led to:

https://tablica-rejestracyjna.pl/komentarze/WWY

There, I browsed through the pages manually until I found the original image on page 3.

Downloaded it and prepared to analyze its metadata.


Step 5: Extracting the Flag

Ran exiftool on the downloaded original image:

exiftool original-car-photo.jpg

This time I got the jackpot:

...
Build Number                    : S2RUBS32.51-15-3-19
...

Step 6: Submitting the Flag

I submitted the flag using the required format:

1753c{S2RUBS32.51-15-3-19}

Correct!


Final Flag

1753c{S2RUBS32.51-15-3-19}