droid2 picoCTF Reverse Engineering writeup
Description
Find the pass, get the flag. Check out this file.
Solution
lets decompile the app using jadx-gui
Link to download jadx-gui
wget https://github.com/skylot/jadx/releases/download/v1.1.0/jadx-1.1.0.zip
unzip jadx-1.1.0.zip -d jadx
cd jadx
./jadx-gui
Lets launch and open two.apk and seek to com.hellocmu.picoctf.FlagstaffHill
At this function we have seen an array containing string and the if condition is trying to access the array.
Above that there is a variables and i try to represent those like this
then I create a simple python program because I don't like in Java for real.
here is the program
Now, lets try this password
dismass.ogg.weatherwax.aching.nitt.garlick
Flag:
picoCTF{what.is.your.favourite.colour}


Comments
Post a Comment