# HackTheBox-Cat
We get an archive which after extracting we get `cat.ab` file
So doing a little google it seems we can extract this backup which is created
https://android.stackexchange.com/questions/28481/how-do-you-extract-an-apps-data-from-a-full-backup-made-through-adb-backup
```bash
( printf "\x1f\x8b\x08\x00\x00\x00\x00\x00" ; tail -c +25 cat.ab ) | tar xfvz -
```
Now here I ran into a rabbit hole , as I started digging into some xml files I saw an email address
I tried doing some OSINT on `fredhond556` but found nothing but then I reliazed that there was another folder that was extracted
Going into `Pictures` we can see some cat pictures and a picture with a guy stadning holding something , now at first I ignored this as when I zoomed at it the text on the paper contained `lorem ipsem`
If we scroll down at the bottom we'll see the flag