IT 2025 labs: the early bird/hacker catches the worm

Here you can find encrypted files containing other encrypted files 😉 Your task is to decrypt the zip file (encrypted symmetrically), then unzip, again decrypt the pdf file (this time encrypted asymmetrically — the keys are included in the zip file); finally, create the copy of my pdf with your first and second name as the author.

13:00 — heere is your file: http://bacon.umcs.lublin.pl/~wolsk/wp-content/weinberg_weinberg.zip.asc

14:40 — heere is your file: http://bacon.umcs.lublin.pl/~wolsk/wp-content/weinberg_higgs.zip.asc

16:10 — heere is your file: http://bacon.umcs.lublin.pl/~wolsk/wp-content/weinberg_penrose.zip.asc