Tags: forensics android 

Rating: 5.0

Locked KitKat Writeup

zer0pts CTF 2020 - forensics 100

We've extracted the internal disk from the Android device of the suspect. Can you find the pattern to unlock the device? Please submit the correct pattern here.

Extract gesture.key

Mount given image and find gesture.key which contains hashed information of locked pattern.

$ mkdir tempdir
$ sudo mount -o loop android.4.4.x86.img tempdir
$ find tempdir/ -name gesture.key

Now bruteforce to get the lock pattern code. I used GestureCrack. Below is the output.

        The Lock Pattern code is [3, 2, 1, 5, 6, 4]

        For reference here is the grid (starting at 0 in the top left corner):

        |0|1|2|
        |3|4|5|
        |6|7|8|

Submit the pattern code to given server, and get the flag:

zer0pts{n0th1ng_1s_m0r3_pr4ct1c4l_th4n_brut3_f0rc1ng}
Original writeup (https://github.com/pcw109550/write-up/tree/master/2020/zer0pts/Locked_KitKat).