: Use tools like exiftool to see if a password or hint was left in the file comments.
Example: rar2john two1.rar > hash.txt followed by john hash.txt .
If you found two1.rar on a suspicious website or as an unexpected email attachment, . RAR files can be used to deliver:
: Use the file command in Linux ( file two1.rar ) to confirm it is actually a RAR archive and not a renamed PDF or executable.