Rating:

While viewing the FTP traffic in Challenge 1, several additional files were also identified and can be extracted using the same steps:

- [supersecure.7z](https://gitlab.com/malcrypt/ctf-archive/-/blob/master/2021/tenable/forensics/hacker_exposed/supersecure.7z)
- [compression_info.txt](https://gitlab.com/malcrypt/ctf-archive/-/blob/master/2021/tenable/forensics/hacker_exposed/compression_info.txt)

`compression_info.txt` tells us that the password for `supersecure.7z` is `bbqsauce`. Extract the contents of the 7z and the second flag is in [pickle_nick.png](https://gitlab.com/malcrypt/ctf-archive/-/blob/master/2021/tenable/forensics/hacker_exposed/pickle_nick.png)

Original writeup (https://malcrypt.gitlab.io/blog/ctfs/2021/tenable/forensics/hacker_exposed/#challenge-2-25).