forensicsProeasy
Матрешка (Matreshka)
hackerlab
Task: Extract flag from 26 nested password-protected ZIP archives. Solution: Discovered password pattern where each archive's password is the previous archive's filename, automated extraction with Python script.
$ ls tags/ techniques/
nested_archive_extractionpassword_pattern_discoveryscripted_extraction
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [forensics][Pro]Матрешка 2 (Matryoshka 2)— hackerlab
- [forensics][Pro]Evil Matryoshka— taipanbyte
- [forensics][Pro]ZipLock— hackerlab
- [misc][Pro]Игра (Game)— hackerlab
- [forensics][Pro]Мим— duckerz