Tags: forensic 

Rating: 5.0

# Contact point

## Task


## Solution

Here I was given an android backup file [backup](./src/backup.ab). There is a tool ["abe"](./src/abe.jar) (aka "Android backup extractor"). So I used it and got the tar archive backup.tar.


After unpacking the archive I got lots of folders of applications' data. In the folder 'com.android.browser' I found the database.


Looking into the database I found the table with the browser's history and the flag.


So the flag is `KorNewbie{Jeju_international_airport}`

Original writeup (https://github.com/0awawa0/CTF-Writeups/tree/master/Newbie%20CTF%202019/Contact%20Point).