This is the "meat" of the write-up. Explain your steps chronologically.
Use the file command in Linux to confirm it is a true ZIP archive.
If the file is password-protected, note if it uses standard ZipCrypto or AES-256. This determines which tools (like bkcrack for ZipCrypto or John the Ripper for AES) are necessary. 3. Methodology & Exploitation
