01 86 95 72 01

File: Spookytimes_2-pc.zip - ...

Check the EXIF data of any images found inside using exiftool . Often, clues or parts of the flag are hidden in the Comment or Artist tags.

If the flag appears as a string of random characters (e.g., ZmxhZ3tnMDBkX2pvYn0= ), it is likely Base64 encoded. Use a decoder to reveal the cleartext. Conclusion File: spookytimes_2-pc.zip ...

Upon extraction, you typically find a set of files (often images or text files) that require further investigation: Check the EXIF data of any images found

If images are present, they may contain hidden data. Tools like StegSolve (to check color planes) or steghide (for hidden embedded files) are commonly used. Phase 3: Solving for the Flag Use a decoder to reveal the cleartext

View the files inside the archive without extracting them to check for suspicious filenames or nested structures. unzip -l spookytimes_2-pc.zip

Often a .txt file or a final image.