reversehard
Андрей Андреевич (Andrew Andreevich)
duckerz
Task: Android APK with native JNI library containing encrypted flag. Solution: Reverse-engineered custom hash function and XOR cipher, discovered Android Bionic uses BSD PRNG (not glibc LCG), brute-forced 5-char input with known-plaintext constraints from flag format.
$ ls tags/ techniques/
xor_decryptionknown_plaintext_attackapk_decompilationjni_reverse_engineeringbionic_prng_emulationconstraint_based_pruning
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]