{"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fzarat.hatenablog.com%2Fentry%2F2020%2F04%2F06%2F153833\" title=\"Locked KitKat - zer0ops CTF 2020 Forensics writeup - 4ensiX\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","published":"2020-04-06 15:38:33","author_url":"https://blog.hatena.ne.jp/Zarat/","provider_url":"https://hatena.blog","blog_url":"https://zarat.hatenablog.com/","url":"https://zarat.hatenablog.com/entry/2020/04/06/153833","version":"1.0","title":"Locked KitKat - zer0ops CTF 2020 Forensics writeup","blog_title":"4ensiX","image_url":null,"type":"rich","categories":["Forensics","zer0ops","CTF","The Sleuth Kit","android"],"height":"190","provider_name":"Hatena Blog","description":"\u4e16\u9593\u69d8\u306f4\u6708\u3067\u3059\u304c\u3001\u81ea\u5206\u306f3\u6708\u3092\u632f\u308a\u8fd4\u3063\u3066\u3044\u307e\u3059\u3002 2020/03/07 09:00 JST \u2014 2020/03/09 09:00 JST\u306b\u884c\u308f\u308c\u305f\u300czer0ops CTF 2020\u300d\u306e\u300cLocked KitKat\u300d\u306ewriteup\u3092\u304a\u5c4a\u3051\u3002 ctftime.org \u8272\u3093\u306a\u4eba\u304c\u66f8\u3044\u3066\u3044\u308b\u306e\u3067\u3001\u898b\u98fd\u304d\u3066\u3044\u308b\u304b\u3082\u3057\u308c\u306a\u3044\u3051\u308c\u3069\u898b\u3066\u3044\u308b\u65b9\u306b\u306f\u611f\u8b1d\u3057\u304b\u306a\u3044\u3002 Locked KitKat We've extracted the internal disk from the Android device of the suspect. Can you find the pattern to unlock \u2026","width":"100%","author_name":"Zarat"}