reverseProhard

Андрей Андреевич (Andrew Andreevich)

duckerz

Task: Android APK with native JNI library containing encrypted flag. Solution: Reverse-engineered custom hash function and XOR cipher, discovered Android Bionic uses BSD PRNG (not glibc LCG), brute-forced 5-char input with known-plaintext constraints from flag format.

$ ls tags/ techniques/
xor_decryptionknown_plaintext_attackapk_decompilationjni_reverse_engineeringbionic_prng_emulationconstraint_based_pruning

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups