write-ups-challenges-2024-2025/oats1/SOLUTION.md

14 lines
544 B
Markdown
Raw Normal View History

2024-11-25 21:31:09 +00:00
## Difficulty
Easy
## Category
Reverse Engineering
## How To Solve
When you run the app on an android device/emulator, you immediately notice that you won't find the flag in the app itself.
Instead, you need to use a tool like `apktool` to reverse engineer the APK file. Running `apktool d oats1.apk` will decode the file. Grep "IGCTF" in the obtained folder to discover the flag.
```
> grep -r "IGCTF" .
./smali_classes3/com/example/oats/MainActivityKt.smali: const-string v14, "IGCTF{Unus3d_vari4bl3}"
```
## Flag
`IGCTF{Unus3d_vari4bl3}`