First Find
Name: First Find Description: Unzip this archive and find the file named 'uber-secret.txt' Download zip file Author: LT 'syreal' Jones Tags: Easy, General Skills, picoGym Exclusive Challenge from: picoGym Exclusive Files: files.zip
Theory
According to the description, to get the flag we have to search for a file called uber-secret, which i don't really know how to do, so I'll try doing the same thing as Big Zip, and find recursively through all files in all folders of the zip. Just use grep with the recursive option, looking for the flag, with an asterisk to look through all the folders in whatever the zip folder is called:
grep -R "picoCTF{" first-find-folder-name/*
Solution
First, let's just get the zip, open it, and place ourselves inside:
shukularuni-picoctf@webshell:~$ wget https://artifacts.picoctf.net/c/500/files.zip --2025-04-13 18:38:36-- https://artifacts.picoctf.net/c/500/files.zip Resolving artifacts.picoctf.net (artifacts.picoctf.net)... 3.160.22.16, 3.160.22.43, 3.160.22.92, ... Connecting to artifacts.picoctf.net (artifacts.picoctf.net)|3.160.22.16|:443... connected. HTTP request sent, awaiting response... 200 OK Length: 3995553 (3.8M) [application/octet-stream] Saving to: 'files.zip' files.zip 100%[=================================================================================================================================================================>] 3.81M 1.82MB/s in 2.1s 2025-04-13 18:38:39 (1.82 MB/s) - 'files.zip' saved [3995553/3995553] shukularuni-picoctf@webshell:~$ unzip files.zip Archive: files.zip creating: files/ creating: files/satisfactory_books/ creating: files/satisfactory_books/more_books/ inflating: files/satisfactory_books/more_books/37121.txt.utf-8 inflating: files/satisfactory_books/23765.txt.utf-8 inflating: files/satisfactory_books/16021.txt.utf-8 inflating: files/13771.txt.utf-8 creating: files/adequate_books/ creating: files/adequate_books/more_books/ creating: files/adequate_books/more_books/.secret/ creating: files/adequate_books/more_books/.secret/deeper_secrets/ creating: files/adequate_books/more_books/.secret/deeper_secrets/deepest_secrets/ extracting: files/adequate_books/more_books/.secret/deeper_secrets/deepest_secrets/uber-secret.txt inflating: files/adequate_books/more_books/1023.txt.utf-8 inflating: files/adequate_books/46804-0.txt inflating: files/adequate_books/44578.txt.utf-8 creating: files/acceptable_books/ creating: files/acceptable_books/more_books/ inflating: files/acceptable_books/more_books/40723.txt.utf-8 inflating: files/acceptable_books/17880.txt.utf-8 inflating: files/acceptable_books/17879.txt.utf-8 inflating: files/14789.txt.utf-8
And wait, that was unexpected, I guess we won't need to find recursively, because when unzipping, it shows all the files and folders being extracted from it, so it literally says where uber-secret is located, just need to copy the file name and cat to get the flag:
shukularuni-picoctf@webshell:~$ cat files/adequate_books/more_books/.secret/deeper_secrets/deepest_secrets/uber-secret.txt picoCTF{f1nd_15_f457_ab443fd1}
There we go! That's the flag.
I rated this level as "good"! :3
https://play.picoctf.org/practice/challenge/320