Skip to content

Instantly share code, notes, and snippets.

View caprinux's full-sized avatar
😴
sleeping

Elma caprinux

😴
sleeping
View GitHub Profile
@caprinux
caprinux / README.md
Last active November 19, 2024 07:48
SANS SEC575 Practice — Get The Plans (Hard)

TLDR

We are provided with an APK file, which can be statically decompiled via tools like JADX or JEB.

From the APK file, we can obtain the native library that is used to validate the 20 character passcode (between 0x0 - 0xF)

We can reverse the passcode checking function to brute force many possible passcode combinations.

We can use each of this combination to decrypt the ciphertext, one will finally work to give us the flag.

@caprinux
caprinux / readme.md
Created April 26, 2024 06:12
geekctf short writeups

GeekCTF Writeups

Pwn

Memo0

Upon decompiling the program, we see that the bulk of the code is in the login() function.

We can see that our input is encoded, then compared