Flatpack-522.rar
# 1. Extract outer archive (password = 522) unrar x -p522 flatpack-522.rar
hidden.txt now contains:
$ zbarimg _mystery.bin.extracted/00000000.png QR-Code:HTBfl4t_p4ck_5c4nn3r_2023 That is the flag. Below is a one‑liner script that reproduces the entire process automatically. It assumes you have unrar , zsteg , binwalk , and zbarimg installed. flatpack-522.rar
The secret lies within the binary. So the PNG is just a hint, not the flag itself. 6.1 File Type $ file mystery.bin mystery.bin: data Run binwalk to look for embedded files: It assumes you have unrar , zsteg ,
$ display cover.png Nothing obvious appears. However, the challenge name “FlatPack” hints at “flat” data (i.e., a flat image with hidden data). Use zsteg (a popular stego tool) to search for hidden data: done loop.) 4.
$ binwalk mystery.bin Output:
$ unrar x -p522 flatpack-522.rar Result: – the archive opens, extracting a single file named inner.rar . 3.2 Confirmed Password The correct password is 522 (the numeric suffix of the archive’s name). (If you want a more systematic approach, you could also script a quick for i in 0..999; do unrar x -p$i ... && break; done loop.) 4. Analyzing inner.rar The newly extracted inner.rar is again a RAR5 archive, but this time it is not encrypted .
