- The description of challenges states that the flag is hidden like a puzzle within the apk
- The files in the challenge.apk is extracted with the help of jadx (http://www.javadecompilers.com/)
- Upon moving through the folders , we find a folder called recruitment present within the sources folder
- Further inspecting we find a folder called decryptme present within the android folder which contains multiple java programs
- The java file C09922a.java contains a program that checks if the input string is the flag
- Upon reverse engineering the program we get the flag
- Flag = p3nt35t{droid_Enigma_@sc3nd_21wsmkla10o}