reverseProeasy
Зелёный робот (Green Robot)
hackerlab
Task: Android APK with flag verification. Solution: Decompile with jadx, extract hardcoded AES key/IV, decrypt the stored ciphertext to get the flag.
$ ls tags/ techniques/
APK decompilation with jadxAES-256-CBC decryptionHardcoded key/IV extractionJava source code analysis
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]129 (Утка)— duckerz
- [reverse][Pro]Андрей Андреевич (Andrew Andreevich)— duckerz
- [reverse][Pro]Эльфийский смали (Elfiyskiy Smali)— hackerlab
- [reverse][free]SAW— hackthebox
- [mobile][free]APKey— HackTheBox