1. Look at the details of the file
2. Make sure to submit the flag as picoCTF{XXXXX}
wget https://mercury.picoctf.net/static/149ab4b27d16922142a1e8381677d76f/cat.jpg
exiftool cat.jpg
echo cGljb0NURnt0aGVfbTN0YWRhdGFfMXNfbW9kaWZpZWR9 | base64 -d
1. https://www.linuxadictos.com/zh-TW/exiftool-visualiza-los-datos-exif-de-tus-imagenes-desde-la-terminal.html
2. https://www.runoob.com/linux/linux-shell-echo.html
3. https://shengyu7697.github.io/linux-base64/
4. https://zh.wikipedia.org/wiki/Exif
5. https://exiftool.org/
6. https://security.stackexchange.com/questions/3989/how-to-determine-what-type-of-encoding-encryption-has-been-used