Become a member Call our safeguarding helpline

Flatpack-522.rar -

# 1. Extract outer archive (password = 522) unrar x -p522 flatpack-522.rar

Good luck, and happy hunting!

$ feh _mystery.bin.extracted/00000000.png The image is a . Decode it with zbarimg : flatpack-522.rar

[LSB] bpp: 8, plane: 0, offset: 0, bits: 1, 0x30 bytes hidden (ASCII) Extract the LSB stream: flatpack-522.rar

$ display cover.png Nothing obvious appears. However, the challenge name “FlatPack” hints at “flat” data (i.e., a flat image with hidden data). Use zsteg (a popular stego tool) to search for hidden data: flatpack-522.rar

# 2. Extract inner archive (no password) unrar x inner.rar