Ss-ele-017_v.7z -

If the file doesn't open, fix the file header using a hex editor.

If you have analyzed this file and need a write-up, follow this format: SS-Ele-017 Category: Forensics/Misc Objective: Extract the flag from SS-Ele-017_v.7z . Methodology: Extracted file using 7z x . Discovered hidden file .secret.txt using ls -la . Examined contents with cat .secret.txt . Used base64 -d to decode the contents. Flag: FLAG{sample_flag_content} SS-Ele-017_v.7z

Perform file SS-Ele-017_v.7z to confirm it is a 7-Zip archive. If the file doesn't open, fix the file

Hidden text in images ( stegsolve , strings , binwalk ). If the file doesn't open

If requested, use fcrackzip or john the ripper to crack the password. 4. Sample Write-Up Structure