Vishwa CTF: Reverse Engineering: Facile (495)

This is from the 2021 Vishwa CTF

For this challenge, we were given the following clue and a .gzf file:

The “gzf” extension was not familiar and there wasn’t much information online. I did a static file analysis and found some interesting text:

I ran binwalk against it with the extract “-e” switch:

Inspecting the resulting file “FOLDER_ITEM”, I decided to run strings against it:

It yielded a lot of results, so I grep the strings command for “vishwaCTF”:

Now I have the flag!