Description
As you pass through customs, the customs officer asks you to hand over your phone and its unlock code. The phone is returned to you a few hours later…
Suspicious, you send your phone to ANSSI’s CERT-FR for analysis. CERT-FR analysts carry out a collection on the phone, consisting of a sysdiagnose and a backup.
Now that you know which application has been compromised, find out how the attacker retrieved the legitimate application prior to infection.
You’ll need to find :
- The identifier of the application used to retrieve the legitimate application;
- The path used to store the legitimate application;
- The date on which the legitimate application was uninstalled (in local time).
The flag is in the format FCSC{<application identifier>|<path>|<date>}
. For example, if the application used is Example
(com.example
), the path is /private/var/tmp/test.xyz
and the uninstall date is 2025-01-01 01:00:00
: FCSC{com.example|/private/var/tmp/test.xyz|2025-01-01 01:00:00}
.
This challenge is part of a serie. The challenges are independent, except iBackdoor 2/2
whitch depends on iBackdoor 1/2
:
Files
-
backup.tar.xz
31.36 MiB – f7e00e4979573e09f582bebb2a64d5daa0ad6151ca7f6971beabbfaa81b400ce -
sysdiagnose_and_crashes.tar.xz
199.10 MiB – 9a7cc0ee4032bc74d2c162562691594fa772f4f57090b7cc72b6efa0e88582cc
Author

Flag
Submit your solution
You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.
You need to be logged in to submit a writeup.
Writeups
There are no public solutions for this challenge yet, but you can submit yours after getting the flag.