droid2 picoCTF Reverse Engineering writeup

Description

Find the pass, get the flag. Check out this file.
 
Solution 
 
lets decompile the app using jadx-gui 
 
Link to download jadx-gui
 
wget https://github.com/skylot/jadx/releases/download/v1.1.0/jadx-1.1.0.zip
unzip jadx-1.1.0.zip -d jadx
cd jadx
./jadx-gui   
 
 
Lets launch and open two.apk and seek to com.hellocmu.picoctf.FlagstaffHill

 
 
 
At this function we have seen an array containing string and the if condition is trying to access the array.
 
Above that there is a variables and i try to represent those like this 
 

 
then I create a simple python program because I don't like in Java for real.

here is the program

 
 
 Now, lets try this password 
 
dismass.ogg.weatherwax.aching.nitt.garlick
 
Flag:
picoCTF{what.is.your.favourite.colour}
 


 

Comments

Popular posts from this blog

flag [pwn]pwnable.kr game writeup

Malware Development Basics

How to disassemble stripped binary