Writeup by n0tpresl3y for iForensics - iCrash

intro forensics iOS

November 30, 2025

Overview

In this challenge, we are told that the flag is located within phone crash logs. We are given an archive containing a sysdiagnose extraction of an iOS device:

sysdiagnose_and_crashes.tar.xz

Our objective is to inspect its contents and recover the flag.


1 — Extract the archive

We begin by extracting the .xz archive using tar:

tar -xf sysdiagnose_and_crashes.tar.xz

Once unpacked, we notice that the relevant logs are located in:

private/var/mobile/Library/Logs/CrashReporter

This directory contains crash logs generated by the device.


2 — Manual inspection

A quick look through the files reveals one named:

fcsc_intro.txt

Opening it shows the presence of the flag.


3 — Faster method using grep

Instead of manually exploring everything, we can recursively search for the flag format using grep:

grep -r "FCSC{" ./private

grep is included by default on Linux/macOS systems, and available on Windows through Git Bash or WSL.

Output:

./private/var/mobile/Library/Logs/CrashReporter/fcsc_intro.txt:FCSC{7a1ca2d4f17d4e1aa8936f2e906f0be8}

Final Flag

FCSC{7a1ca2d4f17d4e1aa8936f2e906f0be8}