Tags: forensic 

Rating: 5.0

# Contact point

## Task

![task](./src/task.png)

## Solution

Here I was given an android backup file [backup](./src/backup.ab). There is a tool ["abe"](./src/abe.jar) (aka "Android backup extractor"). So I used it and got the tar archive backup.tar.

![unpacking](./src/unpacking.png)

After unpacking the archive I got lots of folders of applications' data. In the folder 'com.android.browser' I found the database.

![database](./src/database.png)

Looking into the database I found the table with the browser's history and the flag.

![history](./src/history.png)

So the flag is `KorNewbie{Jeju_international_airport}`

Original writeup (https://github.com/0awawa0/CTF-Writeups/tree/master/Newbie%20CTF%202019/Contact%20Point).