You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: opentoall-ctf-2015/misc/android-oh-no/README.md
+15-5
Original file line number
Diff line number
Diff line change
@@ -4,10 +4,10 @@
4
4
**Points:** 150
5
5
**Solves:** 14
6
6
**Author:** Eriner
7
-
**Description:**
7
+
**Description:**
8
8
9
9
> It seems someone got a hold of my phone and deleted some important files, and now my phone won't boot! I had an important app on there, maybe you can get it working! Here is an image of my phone...
> Hint: I've encrypted my custom app so no one can find the secretz! Thankfully, I uninstalled it before someone hacked my phone! Trouble is, I can't install it on my new phone! Can you help?
@@ -18,11 +18,21 @@ This challenge revolves around finding an encrypted apk, and then decrypting it
18
18
The app found here is titled: `net.opentoall.flag.flag-1.apk`. This app is a red herring, and upon opening the app, it shows a picture of a red fish and says "I'm here to distract you".
19
19
This app was to be ignored, and had no useful information. It wasn't the encrypted app the challenge described.
20
20
<br>
21
-
<br>
22
21
In the user storage directory, `mnt/android-4.4-r2/data/media/0` the file
23
22
`encrypted.nothingtoseehere.apk` can be found.
24
-
25
23
<br>
24
+
25
+
A shortcut, in this case, would be to use `find` to remove the burden of manual search:
26
+
> ```
27
+
> shell@android ~/ # find mnt/ -type f -iname "*.apk"
@@ -39,7 +49,7 @@ The most important piece of information to glean from this page is:
39
49
> The --algo, --key and --iv parameters obviously have to do with encrypted apps, so before going into details lets first try to install an encrypted APK. Encrypting a file is quite easy to do using the enc OpenSSL commands, usually already installed on most Linux systems. We'll use AES in CBC mode with a 128 bit key (a not very secure one, as you can see below), and specify an initialization vector (IV) which is the same as the key to make things simpler:
Basically, this particular APK has been encrypted _manually_ and doesn't follow the twofish encryption Google Play uses when it encrypts the dmcrypt app-asec files. But you need a key! In the same blog post,
0 commit comments