reverseProhard
Андрей Андреевич (Andrew Andreevich)
duckerz
Task: Android APK with native JNI library containing encrypted flag. Solution: Reverse-engineered custom hash function and XOR cipher, discovered Android Bionic uses BSD PRNG (not glibc LCG), brute-forced 5-char input with known-plaintext constraints from flag format.
$ ls tags/ techniques/
xor_decryptionknown_plaintext_attackapk_decompilationjni_reverse_engineeringbionic_prng_emulationconstraint_based_pruning
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]Эльфийский смали (Elfiyskiy Smali)— hackerlab
- [reverse][Pro]129 (Утка)— duckerz
- [reverse][Pro]Зелёный робот (Green Robot)— hackerlab
- [reverse][free]SAW— hackthebox
- [reverse][Pro]Танчики (Tanks)— duckerz