Skip to content

Latest commit

 

History

History
10 lines (9 loc) · 660 Bytes

babydroid.md

File metadata and controls

10 lines (9 loc) · 660 Bytes

Challenge Description

  • The description of challenges states that the flag is hidden like a puzzle within the apk

Approach

  • The files in the challenge.apk is extracted with the help of jadx (http://www.javadecompilers.com/)
  • Upon moving through the folders , we find a folder called recruitment present within the sources folder
  • Further inspecting we find a folder called decryptme present within the android folder which contains multiple java programs
  • The java file C09922a.java contains a program that checks if the input string is the flag
  • Upon reverse engineering the program we get the flag
  • Flag = p3nt35t{droid_Enigma_@sc3nd_21wsmkla10o}