Challenge Instructions:
In this Capture the Flag (CTF) challenge, in the aftermath of a major event law enforcement has obtained legal authority and is attempting to extract data from a mobile device. They’ve taken an image of the device but are unable to parse any data from it. Looking up the model reveals that its data is encrypted. Given the device image, you must locate the code responsible for the encryption. Once located, use a tool like Ghidra to reverse engineer it. The flag is part of the device's cryptographic operation.