Sussy Disk 4 CTF Challenge Writeup
Challenge Information
- Name: Sussy Disk 4
 - Points: 400
 - Category: Forensics
 - Objective: Unzip a password-protected zip file and retrieve the flag.
 
Solution
Challenge Context:
- This challenge is part of the Sussy Disk series, where the main objective is to recover information from various digital artifacts. The fourth challenge involves unzipping a password-protected zip file found in the user’s document folder.
 
Initial Investigation:
- Upon searching for the zip file in the documents folder, I quickly identified it but struggled to locate the password needed for extraction.
 - I spent considerable time looking for hints throughout the disk image without success.
 
Reading the Challenge Description:
- After several hours, I finally took a closer look at the challenge description, which mentioned that the user frequently utilized PowerShell. This was a critical hint that led me to consider that the zip file might have been created using PowerShell’s 
Compress-Archivecmdlet, which sometimes uses passwords that could be referenced in the PowerShell command history. 
- After several hours, I finally took a closer look at the challenge description, which mentioned that the user frequently utilized PowerShell. This was a critical hint that led me to consider that the zip file might have been created using PowerShell’s 
 Finding the Password:
I accessed the PowerShell console history and searched through it to find any commands that could contain the password for the zip file.
After a thorough search, I successfully located the password used to create the zip file.

Extracting the Zip File:
- With the password in hand, I used it to unzip the protected zip file.
 - Inside the extracted contents, I found a base64 encoded message.
 
Decoding the Flag:
I decoded the base64 message using a decoding tool to retrieve the flag.
