Klaun
Forensics · CCS Club · Uzi
Problem
We're given a RAR archive data v5 file.
I tried to extract using this platform by entering any password to see the result. However, it asked me for a password to download Klaun.png. Another file, Wordlist.txt, was available for download.
Bruteforcing Technique
Output
$rar5$16$66b921062f7fbcf42a7c3bb35e127db3$15$1260ae075dd992e9af0d9db82c2e2741$8$613acf0df906e777:goodiegoodie
After entering the password, you will be able to get Klaun.png file. Use the strings command to get the flag.
strings Klaun.png
FLAG IS : Y2NzQ1RGe1czTExfRDBOM19NWV9GUjEzTkR9
Decode it from base64. CyberChef recipe is here.
ccsCTF{W3LL_D0N3_MY_FR13ND}
Last updated