Injured Android

Flag 1 - Login Activity

This flag was quite simple. After loading the APK into JADX and viewing the source code for the activity, the flag is revealed.

Flag 2 - Exported Activity

Looking at the manifest.xml, there is an exported activity that is directly above the flag2 activity.

Drop into an ADB shell and run the exported activity.

Flag 3 - Resources

Viewing flag 3 login activity.

Checking strings.xml for the reference reveals the flag.

Flag 4 - Login 2

Viewing the activity for login2.

Viewing the method g().a()

Base64 decode the value to reveal the flag.

Flag 5 - Exported Broadcast Receiver

This one was straight forward, open the level 3 times to get the flag.

Flag 6 - Login 3

Viewing the login activity.

Viewing the method k.a

It shows that the key is generated from f1917a.

Decode the value to find the flag.

Flag 7 - SQLite

The database only exists while the activity is open.

Connect via adb.

View the tables.

Viewing the flag7 activity class.

Decode the value to reveal 'f1ag-pa55'.

The other value needs to be ROT47 decoded

e576e5197b8ca67dbc2169a11a85b862.png

Flag 8 - AWS

There was a mention of AWS in the strings.xml file.

Used cloud_enum to search for any cloud resources. Found an open S3 bucket.

Flag 9 - Firebase

There is a Firebase URL referenced in strings.xml

Base64 decode the value.

Access the endpoint using the .json trick.

Last updated