11-20.7z May 2026
: Use 7z l -slt 11-20.7z to view technical details and comments that might contain hints. Step 3: Handling the Recursion (The "Nested" Problem)
Once you reach the final file (e.g., 20.7z or a flag.txt inside it), the flag is rarely in plain text. Common obfuscations include:
The first step is always to identify what you are dealing with. Using the file command in Linux or a hex editor like 010 Editor helps verify the file header. : file 11-20.7z 11-20.7z
: Check the archive's "Comment" section; flags are often hidden there to reward those who don't just "Extract All". Step 5: Final Flag Submission
: Use a Python script or a bash loop to extract until no more archives remain. : Use 7z l -slt 11-20
: Right-click, extract, repeat. This is inefficient for 10+ layers.
import subprocess import os filename = "11-20.7z" while True: # Attempt to extract. -p can be used if there's a known password. result = subprocess.run(["7z", "x", filename, "-y"], capture_output=True) # Logic to find the next .7z file in the directory next_files = [f for f in os.listdir('.') if f.endswith('.7z') and f != filename] if not next_files: break filename = next_files[0] print(f"Extracted: filename") Use code with caution. Copied to clipboard Using the file command in Linux or a
Many "nested zip" challenges use a pattern where the filename itself is the key.
Dtest 2
Hi Nic, just a test message to see if i get a repeat of last nights error. If it seems to go ok I will compile my note to you from yesterday …here goes…
It worked 🙂