R5-D4

forensics disk network android FCSC 2022 solved on

star star star

Description

The GoodCorp‘CEO is furious: she is convinced that her phone is not backdoored by one but by two malicious actors, the second one being much more involved than the first. Knowing she is being targeted, she uses a physical keyboard connected to her phone via USB when typing her biggest secrets… Despite these precautions, she is convinced that her phone is compromised to the lowest level, and asks for your help to prove it.

Once again, you decide to emulate the phone completely, in order to investigate further. You also take the capture of a previous analysis, in case you missed something.

**Note: The Authenticator application is not part of the challenge.

This challenge has been split into three parts:

Files

  • capture.cap
    65.88 MiB – 7b63c22567098f829dfdc190b6f531bbdf23a23e222508752a0a5e5dfa28259c
  • android.zip
    1.80 GiB – 8fb8c44e130413d49370868ac720b4cd780aa19e636a3dad293d9e6a9d0a25d2
  • emulator-howto.pdf
    50.91 KiB – 92305baa9ca7190f4e565c3f627336413efdc10d2c123a39a729aa3c769837e1

Author

\E

Flag

Share my success on Fediverse, Twitter, Linkedin, Facebook, or via email.

Submit your solution

You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.

You need to be logged in to submit a writeup.

Writeups

I've been looking for a long time and I still can't find the flag!

You can vote for the solutions you prefer by using the on their respective pages.

DateAuthor Language Tags Vote
2023-11-06
areizen
🇫🇷
TeamFrance