Description
As you pass through customs, the customs officer asks you to hand over your phone and its unlock code. The phone is returned to you a few hours later…
Suspicious, you send your phone to ANSSI’s CERT-FR for analysis. CERT-FR analysts carry out a collection on the phone, consisting of a sysdiagnose and a backup.
You continue your analysis to find the backdoor on the phone. Eventually, you realize that an application has been compromised and that the phone was infected at the time of collection… Find the identifier of the compromised application and the process identifier (PID) of the malware.
The flag is in the format FCSC{<application identifier>|<PID>}
. For example, if the compromised application is Example
(com.example
) and the PID is 1337: FCSC{com.example|1337}
.
This challenge is part of a serie. The challenges are independent, except iBackdoor 2/2
whitch depends on iBackdoor 1/2
:
Files
-
backup.tar.xz
31.36 MiB – f7e00e4979573e09f582bebb2a64d5daa0ad6151ca7f6971beabbfaa81b400ce -
sysdiagnose_and_crashes.tar.xz
199.10 MiB – 9a7cc0ee4032bc74d2c162562691594fa772f4f57090b7cc72b6efa0e88582cc
Author

Flag
Submit your solution
You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.
You need to be logged in to submit a writeup.
Writeups
There are no public solutions for this challenge yet, but you can submit yours after getting the flag.