Connect
To Top

Porcupinecrummy.7z

(e.g., Forensics / Cryptography / Reverse Engineering) Difficulty: (e.g., Easy / Medium)

Example: 7z2john PorcupineCrummy.7z > hash.txt && john --wordlist=rockyou.txt hash.txt PorcupineCrummy.7z

"Upon attempting to open the file using 7-Zip , I noticed the filenames were encrypted/visible, but the contents required a password." 3. Analysis & Exploitation Explain the "Aha!" moment. How did you get in? Did you use HxD or strings to find hidden metadata

Did you use HxD or strings to find hidden metadata? 4. Extraction List the files found inside the archive: hint.txt – (Describe what was inside). image.png – (Was there hidden data in the LSB?). flag.txt – The target file. 5. The Flag Provide the final string and explain how it was formatted. Flag: CTF{P0rcupin3_Crumb_Tr4il} Challenge Overview Name: PorcupineCrummy

Since I don't have the specific contents of your file, here is a professional template you can use to document your findings. 1. Challenge Overview Name: PorcupineCrummy

More in