From the discourse page we are given the following information:

setup

Based on the information given, we have to tinker with the image posted:

myself-avatar

Let’s first check if there are embedded files within the image using the following command:

$ binwalk myself-avatar.jpg

binwalk

Okay so there’s a zip file hidden, let’s extract it using the following command:

$ binwalk --dd='.*' myself-avatar.jpg

extract

We now have the following zip file, it is password protected. From here we could attempt to brute force it with a tool but I was lucky and guessed the correct password to be password.

Inside the folder called myself we see a bunch of cat images and an interesting file called myself.txt

folder

We extract the flag from this file:

FLAG-43e1f21fd2741b2266eaf9c6cf93b46f62b73d7d9df0fa1e98611e6f64200815

Here was my favorite image:

cat14