Flatpack-522.rar -
# 1. Extract outer archive (password = 522) unrar x -p522 flatpack-522.rar
Good luck, and happy hunting!
$ feh _mystery.bin.extracted/00000000.png The image is a . Decode it with zbarimg : flatpack-522.rar
[LSB] bpp: 8, plane: 0, offset: 0, bits: 1, 0x30 bytes hidden (ASCII) Extract the LSB stream: flatpack-522.rar
$ display cover.png Nothing obvious appears. However, the challenge name “FlatPack” hints at “flat” data (i.e., a flat image with hidden data). Use zsteg (a popular stego tool) to search for hidden data: flatpack-522.rar
# 2. Extract inner archive (no password) unrar x inner.rar