March
4th,
2019

First, let’s take a look at the file :

It’s a Zip archive, so try to unzip it :

We need a password, I used john to crack it :
zip2john hardshells > hash
john hash
And we got the password :

Now we have a Minix file whose name “d”, mount it :
mount -t minix d /mnt/test
And we have a new file “dat”, if we look at the header with hexdump we suppose it’s a .PNG but the header has been modified :

Use a hexeditor to modified the U(55 in hex) to N(4e in hex)

Now you can open it and read the flag :

Flag :
IceCTF{look_away_i_am_hacking}