ngga tau
Solved by : grb

In this challenge, we are provided with chall.png; let's immediately use the tool Binwalk.
why binwalk ??
Binwalk is excellent at finding signatures (unique file headers/footers) of known file types (like ZIP, JPEG, or even firmware components) that might be hidden or appended after the primary file structure (the PNG image).
$ binwalk johen.png
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
0 0x0 JPEG image data, JFIF standard 1.01
122747 0x1DF7B Zip archive data, encrypted at least v2.0 to extract, compressed size: 78, uncompressed size: 73, name: flag.txt
122985 0x1E069 End of Zip archive, footer length: 22
Interpretation
Appending archives to images is a common steganographic/“hide-in-plain-sight” technique used in CTFs and forensic challenges. Because the ZIP is a valid PKZIP-style archive and the entry is encrypted, we need to treat this as a password-protected ZIP cracking problem rather than an image-processing problem.
binwalk -e johen.png
# result: _johen.png.extracted/1DF7B.zip
Okay, the output shows that there is a password to open the zip file. To guess that password, we will use the tool John the Ripper. Here is the payload:
john --wordlist=~/wordlists/rockyou.txt --format=pkzip 1DF7B.hash
That payload uses a wordlist that can be installed from git clone https://github.com/danielmiessler/SecLists.git ~/SecLists
From that process, we can extract the zip file and output the file flag.txt
andd cat that filee..
compit{cb433a507d9b3bdcd1481550b38aaa474a15452897193d1cbec25277d763323f}
Happy hackking.. 😜😜