Writeups
CTF Writeups
-
Read more: THC CTF 2018 – Android serial
Description: A paid android app for THC began to be developed, unfortunately its development stalled. In the end, it was never possible to buy this app, but be the first to unlock the app’s premium features by finding a valid key. Download: https://lautarovculic.com/my_files/THC.apk Install the APK file with ADB adb install -r THC.apk We can see that we have…
-
Read more: Mystiko – Kryptonite
Category: CryptoDescription: This challenge intends to show how to enumerate android apps in search for hidden information. Download APK: https://lautarovculic.com/my_files/kryptonite.apk Install the APK file with ADB adb install -r krypto.apk We can see that we have an encrypt/decrypt message app.The text is in leet speak.And the title says: AES is kryptonite for haxors Notice that, trying the length of the key randomly, I see the correct…
-
Read more: NahamCon CTF 2021 – Andra & Resourceful
Andra Description: You know what to do. 🙂Download: https://lautarovculic.com/my_files/andra.apk Install the APK file using ADB adb install andra.apk We can see a simple login activity.Let’s inspect the source code with jadx. We can see the credentials of this login in the MainActivity class: final String str = “Nahamcom”; final String str2 = “pink_panther@786”; Username: nahamcomPassword: pink_panther@786 Then, the com.example.hack_the_app.flag activity will be showed with the flag. Flag: flag{d9f72316dbe7ceab0db10bed1a738482 Resourceful Description: I…
-
Read more: NahamCon CTF 2020 – Candroid & Simple App
Candroid Description: I think I can, I think I can!Download: https://lautarovculic.com/my_files/candroid.apk Install the APK file with ADB adb install -r candroid.apk Decompile the application with apktool apktool d candroid.apk The app name is “Nahamcon1“If we insert any text as password, a message will prompt saying:Error: Reading the password file Notice that a password.txt file is created in the external directory: File file =…
-
Read more: Hacktivitycon 2021 – To Do & Reactor
Challenges To Do Description: I made my own app to remind me of all the things I need to do.Download: https://lautarovculic.com/my_files/todo.apk Install the APK file with ADB adb install -r todo.apk Let’s inspect the source code with jadx.Meanwhile, we can see that we have an password text field, if we insert any char, we get the message “Wrong password“. Looking…
-
Read more: Google CTF 2020 – Sandbox
Download: https://lautarovculic.com/my_files/google2020reverse.apk Install the APK with ADB adb install -r google2020reverse.apk Let’s inspect the source code with jadx.We can see that jadx doesn’t work.So move to dex2jar tool. d2j-dex2jar google2020reverse.apk The MainActivity is called ő.The code is malformed, that why we can’t decompile the code and then, read it. The constructor and onCreate() are obfuscated with invalid try/catch (such as catch I, which is invalid because int is not a Throwable).…
-
Read more: Trend Micro CTF 2020 – Keybox
Description: The flag file is built into this Android application APK file.The flag is encrypted using five keys.Below is shown the status of each of the five keys. Red is locked, green is unlocked.The challenge is to decrypt each of these keys so that you can decrypt the flag. Tap on each key to retrieve…
-
Read more: Mobile Hacking Lab – Captain Nohook
Description: Welcome to the iOS Application Security Lab: Captain No Hook Anti-Debugging Challenge. This challenge focuses on a fictitious app called Captain No Hook, which implements advanced anti-debugging / jailbreak detection techniques. Your objective is to bypass these protections and retrieve the hidden flag within the app. Download: https://lautarovculic.com/my_files/noHook.ipaLink: https://www.mobilehackinglab.com/path-player?courseid=lab-captain-nohook Final Steps Install an IPA file can be difficult.So, for…
-
Read more: Mobile Hacking Lab – Run Time
Description: Welcome to the iOS Application Security Lab: Dynamic Library Injection Challenge. This challenge focuses on a fictitious app called Run Time , which tracks the steps while running. Your objective is to bypass the app’s protections, deliver the exploit and gain code execution utilizing the dynamic library injection. Download: https://lautarovculic.com/my_files/runtime.ipaLink: https://www.mobilehackinglab.com/path-player?courseid=lab-runtime Install an IPA file can be difficult.So, for…
-
Read more: Mobile Hacking Lab – No Escape
Description: Welcome to the iOS Application Security Lab: Jailbreak Detection Evasion Challenge. The challenge centers around a fictitious app called No Escape, designed with robust jailbreak detection mechanisms. Your mission is to bypass these mechanisms and gain full access to the app’s functionalities using Frida. Download: https://lautarovculic.com/my_files/noEscape.ipaLink: https://www.mobilehackinglab.com/path-player?courseid=lab-no-escape Install an IPA file can be difficult.So, for make it more easy,…