```shell
┌──(kali㉿kali)-[~/code]
└─$ strings cat.jpg | grep "pico"
```
...Nothing
```shell
┌──(kali㉿kali)-[~/code]
└─$ exiftool cat.jpg
ExifTool Version Number : 12.57
File Name : cat.jpg
Directory : .
File Size : 878 kB
File Modification Date/Time : 2021:03:15 14:24:46-04:00
File Access Date/Time : 2023:08:03 02:47:30-04:00
File Inode Change Date/Time : 2023:08:03 02:47:30-04:00
File Permissions : -rw-r--r--
File Type : JPEG
File Type Extension : jpg
MIME Type : image/jpeg
JFIF Version : 1.02
Resolution Unit : None
X Resolution : 1
Y Resolution : 1
Current IPTC Digest : 7a78f3d9cfb1ce42ab5a3aa30573d617
Copyright Notice : PicoCTF
Application Record Version : 4
XMP Toolkit : Image::ExifTool 10.80
License : cGljb0NURnt0aGVfbTN0YWRhdGFfMXNfbW9kaWZpZWR9
Rights : PicoCTF
Image Width : 2560
Image Height : 1598
Encoding Process : Baseline DCT, Huffman coding
Bits Per Sample : 8
Color Components : 3
Y Cb Cr Sub Sampling : YCbCr4:2:0 (2 2)
Image Size : 2560x1598
Megapixels : 4.1
```
*DESCRIPTION. A command-line interface to Image::**ExifTool**, used for **reading and writing meta information in a variety of file types**. FILE is one or more source file names, directory names, or - for the standard input.*
```shell
┌──(kali㉿kali)-[~]
└─$ python3
Python 3.11.2 (main, Mar 13 2023, 12:18:29) [GCC 12.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>> import base64
>>> base64.b64decode(b'cGljb0NURnt0aGVfbTN0YWRhdGFfMXNfbW9kaWZpZWR9')
b'picoCTF{the_m3tadata_1s_modified}'
```
then use Python to decode it