Last updated
Last updated
We start with a .zip file. When we unzip, we get a directory called 0. It contains one file, 1.tar.bz2
If we decompress this file, we get a directory called 1, which contains 1.txt and another compressed file. This repeats.
The text files seem to contain tjctf{n0t_th3_fl4g}
, I took a guess that at some level in this recursive compression has a .txt file that yields the flag.
This is relatively simple. Every file is either .kz3, .tar.bz2, or .tar.gz. We can use file extensions to detect which type of file it is, and then decompress. Script below(a bit bad, I'm aware) I unzipped up to directory 1 manually because it's different to the rest.
After running the script you'll be left with a file flags.txt. Majorly, flags.txt contains a bunch of ljctf{n0t_th3_fl4g}
but if you filter this out using grep -v
the flag will be revealed to you.