After downloading and unpacking the original file, we are given a misc.zip file. After running the command 7z x misc.zip, 7zip prompts us for a password.
Using fcrackzip I specified a dictionary type attack using the popular rockyou.txt wordlist in kali. The location is /usr/share/wordlists/rockyou.txt
fcrackzip –v –D –u –p /usr/share/wordlist/rockyou.txt misc.zip
(-v = verbose, -D = dictionary attack, -u = use unzip for wrong passwords, -p = path to wordlist)
After about 3 seconds we receive word the password == jumanji. Using the cat command to display the flag.txt file we see the flag == 4pesb9b9blkfc08e3z2105b1b6bfif45.
Submitting the flag earned us 5pts.