If the password isn't in a wordlist, check the challenge description for clues (e.g., "Amirah's favorite color") or look for Known Plaintext Attacks using Pkcrack if you have an unencrypted version of one file inside the ZIP. 4. Steganography & Hidden Data
The goal is usually to extract a hidden flag from a password-protected or corrupted ZIP archive named Amirah.zip .
Brute-force/Dictionary attack: john --wordlist=rockyou.txt amirah.hash