Porcupinecrummy.7z

Example: 7z2john PorcupineCrummy.7z > hash.txt && john --wordlist=rockyou.txt hash.txt

Did you use HxD or strings to find hidden metadata? 4. Extraction List the files found inside the archive: hint.txt – (Describe what was inside). image.png – (Was there hidden data in the LSB?). flag.txt – The target file. 5. The Flag Provide the final string and explain how it was formatted. Flag: CTF{P0rcupin3_Crumb_Tr4il} PorcupineCrummy.7z

Briefly state the goal (e.g., "Analyze the provided 7z archive to recover the hidden flag"). 2. Initial Reconnaissance Example: 7z2john PorcupineCrummy

"Upon attempting to open the file using 7-Zip , I noticed the filenames were encrypted/visible, but the contents required a password." 3. Analysis & Exploitation Explain the "Aha!" moment. How did you get in? The Flag Provide the final string and explain

(e.g., Forensics / Cryptography / Reverse Engineering) Difficulty: (e.g., Easy / Medium)