This one took a bit more out of me at the start as I was fumbling around trying to convert Hexdump with the xxd command but I wasn’t getting anywhere and nothing was converting.
Then I had a look at what file it was and it turned out it was actually a gzip file? I’m not too familiar with the terminology but I figured I could try and decompress it since the instructions mentioned that it was repeatedly compressed. I renamed the file extension to .gz to allow the gzip -d command to work on it and kept proceeding while using -h to give me tips on which options are needed to decompress as I went along.
As I progressed, I checked in to see if there has been any changes to the file, but no luck. It got to tar, but the –help command was too long and I couldn’t read it properly, so I resorted to Google.
I initially tried tar -x but that didn’t work, but it mentioned -f was missing, so I added it in.
I kept it up and eventually it reached an ASCII text file, which displayed the password! Finally.
The password is 8ZjyCRiBWFYkneahHwxCv3wb2a1ORpYL