1
2
| $ file bomb.zip
bomb.zip: Zip archive data, at least v2.0 to extract
|
Introduction#
This challenge has just a single zip file bomb.zip
, and looking into it, it has nested zips inside and it might be deep.
Solution#
First try#
At first, we used an automated script to extract all files, we got flag.txt
but it only contained many w
characters,
without any sign of the flag.
Second try#
After taking a closer look in the zip files, here an example using 7z
command:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
| $ 7z l bomb.zip
7-Zip [64] 16.02 : Copyright (c) 1999-2016 Igor Pavlov : 2016-05-21
p7zip Version 16.02 (locale=en_US.UTF-8,Utf16=on,HugeFiles=on,64 bits,8 CPUs AMD Ryzen 5 PRO 3500U w/ Radeon Vega Mobile Gfx (810F81),ASM,AES-NI)
Scanning the drive for archives:
1 file, 206803 bytes (202 KiB)
Listing archive: bomb.zip
--
Path = bomb.zip
Type = zip
Physical Size = 206803
Date Time Attr Size Compressed Name
------------------- ----- ------------ ------------ ------------------------
2020-12-03 08:31:56 ..... 157842 8428 0.zip
2020-12-03 08:31:56 ..... 157842 8428 1.zip
2020-12-03 08:31:56 ..... 157842 8428 10.zip
2020-12-03 08:31:56 ..... 157842 8428 11.zip
2020-12-03 08:31:56 ..... 157842 8428 12.zip
2020-12-03 08:31:56 ..... 157842 8428 13.zip
2020-12-03 08:31:56 ..... 157842 8428 14.zip
2020-12-03 08:31:56 ..... 157842 8428 15.zip
2020-12-03 08:31:56 ..... 157842 8428 16.zip
2020-12-03 08:31:56 ..... 157842 8428 17.zip
2020-12-03 08:31:56 ..... 157842 8428 18.zip
2020-12-03 08:31:56 ..... 157842 8428 19.zip
2020-12-03 08:31:56 ..... 157842 8428 2.zip
2020-12-03 08:31:56 ..... 157842 8428 3.zip
2020-12-03 08:31:56 ..... 157842 8428 4.zip
2020-12-03 08:31:56 ..... 157842 8428 5.zip
2020-12-03 08:31:56 ..... 157842 8428 6.zip
2020-12-03 08:31:56 ..... 179640 43869 7.zip
2020-12-03 08:31:56 ..... 157842 8428 8.zip
2020-12-03 08:31:56 ..... 157842 8428 9.zip
------------------- ----- ------------ ------------ ------------------------
2020-12-03 08:31:56 3178638 204001 20 files$
|
We can see that 7.zip
contains a different file size:
1
| 2020-12-03 08:31:56 ..... 179640 43869 7.zip
|
So we continue this chain:
bomb.zip
-> 7.zip
-> 1.zip
-> 4.zip
-> 9.zip
-> 18.zip
-> 8.zip
-> flag.txt
.
Then we can use grep
to get the flag:
1
2
| $ grep wgmy flag.txt
wgmy{04a2766e72f0e267ed58792cc1579791}
|