Rating:
While viewing the FTP traffic in Challenge 1, several additional files were also identified and can be extracted using the same steps:
- [supersecure.7z](https://gitlab.com/malcrypt/ctf-archive/-/blob/master/2021/tenable/forensics/hacker_exposed/supersecure.7z)
- [compression_info.txt](https://gitlab.com/malcrypt/ctf-archive/-/blob/master/2021/tenable/forensics/hacker_exposed/compression_info.txt)
`compression_info.txt` tells us that the password for `supersecure.7z` is `bbqsauce`. Extract the contents of the 7z and the second flag is in [pickle_nick.png](https://gitlab.com/malcrypt/ctf-archive/-/blob/master/2021/tenable/forensics/hacker_exposed/pickle_nick.png)