reversehard

Андрей Андреевич (Andrew Andreevich)

duckerz

Task: Android APK with native JNI library containing encrypted flag. Solution: Reverse-engineered custom hash function and XOR cipher, discovered Android Bionic uses BSD PRNG (not glibc LCG), brute-forced 5-char input with known-plaintext constraints from flag format.

$ ls tags/ techniques/
xor_decryptionknown_plaintext_attackapk_decompilationjni_reverse_engineeringbionic_prng_emulationconstraint_based_pruning

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]