This time the write-up will be a little bit different, as the way I solved it is… pretty damn boring. I’ve literally spent fair amount of time just reading specifics of what ZIP file, and its format is. That being said, let’s see what got on our tinkering station this time.
Okay, so bunch of txt files, weirdly even in their size.
So… after reading about ZIP, we eventually learn it uses CRC32. Delving into what CRC is, we find out it’s reversible, if the initial (in our case) string is exactly 4 (or less than 4) bytes long. How peculiar, coincidentally all the files, except one, in our ZIP are 4 bytes big.
Well, that being said, let’s see if we can guess the content of our encrypted files. First, let’s retrieve the content CRCs.
Great, we can drop the 00000000 as it’s just the folder our files are stored in. Now to guess what the strings resulting in these CRCs are!
which gives us a nice output of
Since I am lazy, let’s make it a little bit easier to read.
Well, there we go. Our flag is “And I would have gotten away with it too, if it weren’t for you meddling kids and your CRC32!”. No explosions, no fireworks, not even firecrackers this time. Rather just somewhat boring task of learning more about ZIP. (Though at first I attempted brute-forcing the password, just in case the mission author wanted to fool us ;)