Kick31.zip

Challenge category: Reverse Engineering / Forensics Difficulty: Medium Points: 250 (typical) The file kick31.zip is a password‑protected ZIP archive. Inside the archive there is a single file named kick31.bin . The goal is to retrieve the flag hidden somewhere in the binary.

#!/usr/bin/env python3 import hashlib import itertools import string kick31.zip

bool check_key(char *input) const uint8_t secret[] = 0x7a, 0x3d, 0x5e, 0x1f, 0x9a, 0xb8, 0xc4, 0x02, 0x6d, 0x55, 0x0a, 0xf1, 0x33, 0x7c, 0x8e, 0xe2 ; uint8_t derived[16]; md5((uint8_t*)input, strlen(input), derived); // simple MD5 hash return memcmp(derived, secret, 16) == 0; // simple MD5 hash return memcmp(derived