EYCC 2025 - Forensics
Hello everyone, This challenge is considered medium-level, not too difficult, but it contains some combined ideas which made it quite interesting. Let’s talk about the beginning.
In this challenge, we have a ZIP file.
- file CUNTISSIMO.zip
CUNTISSIMO.zip: Zip archive data, at least v5.1 to extract, compression method=AES Encrypted

But it was protected with a password. At first, I used rockyou to try and crack the protection.
I used this code to do it, and indeed the password turned out to be 12345678 — much easier than I expected. That was actually quite funny.

Now we have a file, but it doesn’t open. At first, we tried using some tools, like binwalk, to extract files from it or something similar, but all attempts failed.
However, we noticed something very important: when we looked at the hex using

we found data indicating the presence of a JPEG, but the first 3 bytes in the hex were essentially corrupted.
So, we searched for the correct magic number in a GitHub repo, and the expected result was:
https://gist.github.com/leommoore/f9e57ba2aa4bf197ebc5

Now I opened the site https://hexed.it/ so I could edit the first 3 bytes and change them to the correct value. After doing that, I clicked export, and here came the surprise!

An image appeared that contained some encryption, and I thought it was the flag. At first, I assumed it was Base64, but it wasn’t.

So I tried Base32, and indeed it revealed the flag!!!

Thank you all! I hope you enjoyed the article. If you have any questions, I’m here to help.
Remember My name : everythingBlackkkMade
by ❤
Github : https://github.com/everythingBlackkk
Linkedin : www.linkedin.com/in/everythingblackkk
Youtube : https://www.youtube.com/@everythingBlackkk
Last updated