Tags: forensic
Rating: 5.0
# Contact point
## Task
![task](./src/task.png)
## Solution
Here I was given an android backup file [backup](./src/backup.ab). There is a tool ["abe"](./src/abe.jar) (aka "Android backup extractor"). So I used it and got the tar archive backup.tar.
![unpacking](./src/unpacking.png)
After unpacking the archive I got lots of folders of applications' data. In the folder 'com.android.browser' I found the database.
![database](./src/database.png)
Looking into the database I found the table with the browser's history and the flag.
![history](./src/history.png)
So the flag is `KorNewbie{Jeju_international_airport}`