544 B
544 B
Difficulty
Easy
Category
Reverse Engineering
How To Solve
When you run the app on an android device/emulator, you immediately notice that you won't find the flag in the app itself.
Instead, you need to use a tool like apktool
to reverse engineer the APK file. Running apktool d oats1.apk
will decode the file. Grep "IGCTF" in the obtained folder to discover the flag.
> grep -r "IGCTF" .
./smali_classes3/com/example/oats/MainActivityKt.smali: const-string v14, "IGCTF{Unus3d_vari4bl3}"
Flag
IGCTF{Unus3d_vari4bl3}