Injured Android

Flag 1 - Login Activity

This flag was quite simple. After loading the APK into JADX and viewing the source code for the activity, the flag is revealed.

Flag 2 - Exported Activity

Looking at the manifest.xml, there is an exported activity that is directly above the flag2 activity.

Drop into an ADB shell and run the exported activity.

adb shell
am start b3nac.injuredandroid/.b25lActivity

Flag 3 - Resources

Viewing flag 3 login activity.

Checking strings.xml for the reference reveals the flag.

Flag 4 - Login 2

Viewing the activity for login2.

Viewing the method g().a()

Base64 decode the value to reveal the flag.

Flag 5 - Exported Broadcast Receiver

This one was straight forward, open the level 3 times to get the flag.

Flag 6 - Login 3

Viewing the login activity.

Viewing the method k.a

It shows that the key is generated from f1917a.

Decode the value to find the flag.

Flag 7 - SQLite

The database only exists while the activity is open.

Connect via adb.

View the tables.

Viewing the flag7 activity class.

Decode the value to reveal 'f1ag-pa55'.

The other value needs to be ROT47 decoded

e576e5197b8ca67dbc2169a11a85b862.png

Flag 8 - AWS

There was a mention of AWS in the strings.xml file.

Used cloud_enum to search for any cloud resources. Found an open S3 bucket.

Flag 9 - Firebase

There is a Firebase URL referenced in strings.xml

Base64 decode the value.

Access the endpoint using the .json trick.

Last updated