Description
As you pass through customs, the customs officer asks you to hand over your phone and its unlock code. The phone is returned to you a few hours later…
Suspicious, you send your phone to ANSSI’s CERT-FR for analysis. CERT-FR analysts carry out a collection on the phone, consisting of a sysdiagnose and a backup.
To conclude your analysis, find the initial infection vector.
You’ll need to identify :
- the vulnerability used (CVE number);
- the initial infection date (in UTC time, without seconds).
The flag is in the format FCSC{<CVE number>|<infection date>}. For example, if the vulnerability used is CVE-2025-00001 and the infection (UTC) date is 2025-01-01 01:00: FCSC{CVE-2025-00001|2025-01-01 01:00}.
This challenge is part of a serie. The challenges are independent, except iBackdoor 2/2 whitch depends on iBackdoor 1/2:
Files
- 
              backup.tar.xz
 31.36 MiB – f7e00e4979573e09f582bebb2a64d5daa0ad6151ca7f6971beabbfaa81b400ce
- 
              sysdiagnose_and_crashes.tar.xz
 199.10 MiB – 9a7cc0ee4032bc74d2c162562691594fa772f4f57090b7cc72b6efa0e88582cc
Author
 
              Flag
Submit your solution
You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.
You need to be logged in to submit a writeup.
Writeups
There are no public solutions for this challenge yet, but you can submit yours after getting the flag.