-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathmobisec_ctf2.html
More file actions
501 lines (466 loc) · 33.7 KB
/
mobisec_ctf2.html
File metadata and controls
501 lines (466 loc) · 33.7 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8" />
<meta http-equiv="X-UA-Compatible" content="IE=edge" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<meta name="author" content="F3real" />
<meta name="keywords" content="android,reversing,java,dex,apk" />
<meta name="description" content="How to solve MOBISEC CTF reversing challenges 6-7" />
<title>MOBISEC CTF reversing 6-7 - EnSec blog</title>
<link href="https://f3real.github.io/theme/css/combined.css" rel="stylesheet" />
<!-- Feeds -->
</head>
<body data-spy="scroll" data-target="#scrollspy">
<div id="wrapper">
<!-- Sidebar -->
<nav id="sidebar-wrapper-small" class="twitchy-background">
<ul id="accordion-small" class="sidebar-nav sidebar-nav-small">
<li>
<a href="https://f3real.github.io" title="EnSec blog" class="collapsed">
<span class="fas fa-home"></span>
</a>
</li>
<li class="nav-divider"></li>
<li>
<a href="https://f3real.github.io/archives.html" title="Recent Articles" class="collapsed">
<span class="fas fa-th-list"></span>
</a>
</li>
<li class="nav-divider"></li>
<li>
<a data-toggle="collapse" data-parent="#accordion-small" href="#collapse-social-small" title="Social" class="collapsed">
<i class="fas fa-users padding-small"></i>
</a>
</li>
<li class="panel anti-panel"><ul id="collapse-social-small" class="collapse ">
<li>
<a href="https://github.com/F3real" title="Github"><i class="fab fa-github-square padding-small"></i></a>
</li>
<li>
<a href="https://www.linkedin.com/in/stefan-ili%C4%87-61a004111" title="Linkedin"><i class="fab fa-linkedin padding-small"></i></a>
</li>
</ul></li>
<li class="nav-divider"></li>
<li>
<a href="#" title="Back to top" class="collapsed">
<span class="fas fa-arrow-up"></span>
</a>
</li>
</ul>
</nav>
<nav id="sidebar-wrapper" class="twitchy-background">
<ul id="accordion" class="sidebar-nav">
<li class="sidebar-brand">
<a href="https://f3real.github.io/">
<span class="fas fa-home padding-small"></span>
EnSec blog
</a>
</li>
<li>
<a href="https://f3real.github.io/archives.html">
<span class="fas fa-th-list padding-small"></span>
Archives
</a>
</li>
<li class="nav-divider"></li>
<li>
<a data-toggle="collapse" data-parent="#accordion" href="#collapse-social">
<i class="fas fa-users padding-small"></i>
Contact
</a>
</li>
<li class="panel anti-panel"><ul id="collapse-social" class="sidebar_submenu collapse ">
<li>
<a href="https://github.com/F3real" title="Github">
<i class="fab fa-github-square padding-small"></i>
Github
</a>
</li>
<li>
<a href="https://www.linkedin.com/in/stefan-ili%C4%87-61a004111" title="Linkedin">
<i class="fab fa-linkedin padding-small"></i>
Linkedin
</a>
</li>
</ul></li>
<li class="nav-divider"></li>
<li class="panel anti-panel"><ul id="collapse-pages" class="sidebar_submenu collapse ">
</ul></li>
<li class="nav-divider"></li>
<li>
<a data-toggle="collapse" data-parent="#accordion" href="#collapse-categories">
<i class="fas fa-folder-open padding-small"></i>
Categories
</a>
</li>
<li class="panel anti-panel"><ul id="collapse-categories" class="sidebar_submenu collapse ">
<li class="active">
<a href="https://f3real.github.io/category/ctf.html">
<i class="fas fa-folder-open padding-small"></i>
ctf
<span class="badge badge-secondary float-right categorybadge">28</span>
</a>
</li>
<li >
<a href="https://f3real.github.io/category/misc.html">
<i class="fas fa-folder-open padding-small"></i>
misc
<span class="badge badge-secondary float-right categorybadge">15</span>
</a>
</li>
<li >
<a href="https://f3real.github.io/category/reversing.html">
<i class="fas fa-folder-open padding-small"></i>
reversing
<span class="badge badge-secondary float-right categorybadge">6</span>
</a>
</li>
<li >
<a href="https://f3real.github.io/category/tutorial.html">
<i class="fas fa-folder-open padding-small"></i>
tutorial
<span class="badge badge-secondary float-right categorybadge">5</span>
</a>
</li>
</ul></li>
</ul>
</nav>
<!-- /#sidebar-wrapper -->
<!-- open/close sidebar -->
<button onclick="toggleMenu();return false;" class="btn btn-primary" id="menu-toggle">
<span id="right-arrow" class="fas fa-chevron-right" title="expand sidebar"></span>
<span id="left-arrow" class="fas fa-chevron-left" title="minimize sidebar"></span>
</button>
<!-- /open/close sidebar -->
<!-- Page Content -->
<div id="page-content-wrapper">
<div class="container-fluid">
<section id="content">
<article>
<div class="row">
<div class="col-lg-10">
<header class="page-header">
<h1>
<a href="https://f3real.github.io/mobisec_ctf2.html"
rel="bookmark"
title="Permalink to MOBISEC CTF reversing 6-7">
MOBISEC CTF reversing 6-7
</a>
<small>
<div class="post-info">
<div class="publish-info-block">
<small>
<span class="published">
<i class="fa fa-calendar padding-small"></i><time datetime="2019-04-09T10:01:00+02:00"> Tue 09 April 2019</time>
</span>
<span class="category">
<i class="fa fa-folder-open padding-small"></i><a href="https://f3real.github.io/category/ctf.html">ctf</a>
</span>
<span class="tags">
<i class="fa fa-tags padding-small"></i>
<a href="https://f3real.github.io/tag/android.html">android</a> / <a href="https://f3real.github.io/tag/reversing.html">reversing</a> / <a href="https://f3real.github.io/tag/java.html">java</a> / <a href="https://f3real.github.io/tag/dex.html">dex</a> / <a href="https://f3real.github.io/tag/apk.html">apk</a> </span>
</small>
</div>
</div><!-- /.post-info --> </small>
</h1>
</header>
</div>
</div>
<div class="row">
<div class="col-lg-10">
<div class="entry-content">
<p>Let's look at the two harder challenges from MOBISEC ctf.
I'll host challenge apk files <a href="https://github.com/F3real/ctf_solutions/tree/master/2019/mobisec">here</a> in case the site goes down. </p>
<div class="toc">
<ul>
<li><a href="#upos">Upos</a><ul>
<li><a href="#anti-debug-tricks">Anti-debug tricks</a></li>
<li><a href="#smali">Smali</a></li>
</ul>
</li>
<li><a href="#loadme">Loadme</a></li>
</ul>
</div>
<h2 id="upos">Upos</h2>
<p>Upos is probably most interesting challenge from this CTF. I felt like it was undervalued being only 30 points.</p>
<p>Description:
<strong><em>Enjoy this Undebuggable Piece Of Software!</em></strong></p>
<p>So it's supposed to be undebuggable? Since it's reversing challenge we don't really care anyway if we can debug it.</p>
<h3 id="anti-debug-tricks">Anti-debug tricks</h3>
<p>There are four different methods implemented to stop debugging. Interestingly main code for these checks is in <code>android.support.v7.app.Activity</code>. Same checks are also added to <code>checkFlag</code> function.</p>
<p>First check is detecting if frida is being used: </p>
<p>Every Java application has a single instance of class <code>Runtime</code> that allows the application to interface with the environment in which the application is running. The current runtime can be obtained from the <code>getRuntime</code> method. </p>
<div class="highlight"><pre><span></span><code><span class="w"> </span><span class="c1">//List running processes</span>
<span class="w"> </span><span class="n">String</span><span class="w"> </span><span class="n">cmd</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="s">"ls /proc"</span>
<span class="w"> </span><span class="n">Runtime</span><span class="p">.</span><span class="na">getRuntime</span><span class="p">().</span><span class="na">exec</span><span class="p">(</span><span class="n">cmd</span><span class="p">).</span><span class="na">getInputStream</span><span class="p">();</span>
</code></pre></div>
<p>Each row in <code>/proc/$PID/maps</code> describes a region of contiguous virtual memory in a process or thread. It contains pathname - If the region was mapped from a file, this is the name of the file. This field is blank for anonymous mapped regions.</p>
<div class="highlight"><pre><span></span><code><span class="w"> </span><span class="c1">//For every found process</span>
<span class="w"> </span><span class="n">String</span><span class="w"> </span><span class="n">cmd</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="s">"cat /proc/"</span><span class="w"> </span><span class="o">+</span><span class="w"> </span><span class="n">line</span><span class="w"> </span><span class="o">+</span><span class="w"> </span><span class="s">"/maps"</span><span class="p">;</span>
<span class="w"> </span><span class="n">Runtime</span><span class="p">.</span><span class="na">getRuntime</span><span class="p">().</span><span class="na">exec</span><span class="p">(</span><span class="n">cmd</span><span class="p">).</span><span class="na">getInputStream</span><span class="p">();</span>
<span class="w"> </span><span class="c1">//Check if string "frida" is found in result</span>
<span class="w"> </span><span class="p">...</span>
</code></pre></div>
<p>Second check performed is detecting if Google play store is installed on device:</p>
<div class="highlight"><pre><span></span><code><span class="n">ctx</span><span class="p">.</span><span class="na">getPackageManager</span><span class="p">().</span><span class="na">getInstalledApplications</span><span class="p">(</span><span class="n">PackageManager</span><span class="p">.</span><span class="na">GET_META_DATA</span><span class="p">).</span><span class="na">iterator</span><span class="p">()</span>
<span class="p">(((</span><span class="n">ApplicationInfo</span><span class="p">)</span><span class="w"> </span><span class="n">it</span><span class="p">.</span><span class="na">next</span><span class="p">()).</span><span class="na">packageName</span><span class="p">.</span><span class="na">equals</span><span class="p">(</span><span class="s">"com.android.vending"</span><span class="p">))</span>
<span class="p">...</span>
</code></pre></div>
<p>We also have check if debugger is connected:</p>
<div class="highlight"><pre><span></span><code><span class="c1">//null is used when invoking static methods</span>
<span class="n">Class</span><span class="p">.</span><span class="na">forName</span><span class="p">(</span><span class="s">"android.os.Debug"</span><span class="p">).</span><span class="na">getMethod</span><span class="p">(</span><span class="s">"isDebuggerConnected"</span><span class="p">),</span><span class="w"> </span><span class="k">new</span><span class="w"> </span><span class="n">Class</span><span class="o">[</span><span class="mi">0</span><span class="o">]</span><span class="p">).</span><span class="na">invoke</span><span class="p">(</span><span class="kc">null</span><span class="p">,</span><span class="w"> </span><span class="k">new</span><span class="w"> </span><span class="n">Object</span><span class="o">[</span><span class="mi">0</span><span class="o">]</span><span class="p">)).</span><span class="na">booleanValue</span><span class="p">();</span>
</code></pre></div>
<p>And last check is if certificate is unchanged.
A package must be signed with at least one certificate which is at position zero. The package can be signed with additional certificates which appear as subsequent entries.</p>
<div class="highlight"><pre><span></span><code><span class="n">InputStream</span><span class="w"> </span><span class="n">input</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="k">new</span><span class="w"> </span><span class="n">ByteArrayInputStream</span><span class="p">(</span><span class="n">packageInfo</span><span class="p">.</span><span class="na">signatures</span><span class="o">[</span><span class="mi">0</span><span class="o">]</span><span class="p">.</span><span class="na">toByteArray</span><span class="p">());</span>
<span class="n">CertificateFactory</span><span class="w"> </span><span class="n">cf</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="kc">null</span><span class="p">;</span>
<span class="k">try</span><span class="w"> </span><span class="p">{</span>
<span class="w"> </span><span class="n">cf</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="n">CertificateFactory</span><span class="p">.</span><span class="na">getInstance</span><span class="p">(</span><span class="s">"X509"</span><span class="p">);</span>
<span class="p">}</span><span class="w"> </span><span class="k">catch</span><span class="w"> </span><span class="p">(</span><span class="n">CertificateException</span><span class="w"> </span><span class="n">e3</span><span class="p">)</span><span class="w"> </span><span class="p">{</span>
<span class="w"> </span><span class="n">e3</span><span class="p">.</span><span class="na">printStackTrace</span><span class="p">();</span>
<span class="p">}</span>
<span class="n">X509Certificate</span><span class="w"> </span><span class="n">c</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="kc">null</span><span class="p">;</span>
<span class="k">try</span><span class="w"> </span><span class="p">{</span>
<span class="w"> </span><span class="n">c</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="p">(</span><span class="n">X509Certificate</span><span class="p">)</span><span class="w"> </span><span class="n">cf</span><span class="p">.</span><span class="na">generateCertificate</span><span class="p">(</span><span class="n">input</span><span class="p">);</span>
<span class="p">}</span><span class="w"> </span><span class="k">catch</span><span class="w"> </span><span class="p">(</span><span class="n">CertificateException</span><span class="w"> </span><span class="n">e4</span><span class="p">)</span><span class="w"> </span><span class="p">{</span>
<span class="w"> </span><span class="n">e4</span><span class="p">.</span><span class="na">printStackTrace</span><span class="p">();</span>
<span class="p">}</span>
<span class="n">String</span><span class="w"> </span><span class="n">hexString</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="kc">null</span><span class="p">;</span>
<span class="k">try</span><span class="w"> </span><span class="p">{</span>
<span class="w"> </span><span class="n">hexString</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="n">convertToHex</span><span class="p">(</span><span class="n">MessageDigest</span><span class="p">.</span><span class="na">getInstance</span><span class="p">(</span><span class="s">"SHA1"</span><span class="p">).</span><span class="na">digest</span><span class="p">(</span><span class="n">c</span><span class="p">.</span><span class="na">getEncoded</span><span class="p">()));</span>
<span class="p">}</span><span class="w"> </span><span class="k">catch</span><span class="w"> </span><span class="p">(</span><span class="n">NoSuchAlgorithmException</span><span class="w"> </span><span class="n">e1</span><span class="p">)</span><span class="w"> </span><span class="p">{</span>
<span class="w"> </span><span class="n">e1</span><span class="p">.</span><span class="na">printStackTrace</span><span class="p">();</span>
<span class="p">}</span><span class="w"> </span><span class="k">catch</span><span class="w"> </span><span class="p">(</span><span class="n">CertificateEncodingException</span><span class="w"> </span><span class="n">e5</span><span class="p">)</span><span class="w"> </span><span class="p">{</span>
<span class="w"> </span><span class="n">e5</span><span class="p">.</span><span class="na">printStackTrace</span><span class="p">();</span>
<span class="p">}</span>
<span class="n">MainActivity</span><span class="p">.</span><span class="na">f25g4</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="o">!</span><span class="n">hexString</span><span class="p">.</span><span class="na">equals</span><span class="p">(</span><span class="s">"018a94a01edcfd1c8121f56dd36a412e62b3dd8b"</span><span class="p">);</span>
</code></pre></div>
<p>Now lets look at <code>checkFlag</code> function and this is where things get messy. Usually I used Jadx to decompile apks but it fails on this function.
So I decided to try Ghidra.</p>
<p>Well with Ghidra 9.0.1 we get some output but we also get a lot of warnings:</p>
<div class="highlight"><pre><span></span><code>/* WARNING: Removing unreachable block (ram,0x500253d8) */
</code></pre></div>
<p>A lot of code gets removed for supposedly being unreachable and generated Java doesn't even have single <code>return true</code>, obviously not good sign.</p>
<p>Now probably intended way is to try frida (maybe just rename binary since check performed is so simple) or some other instrumentation framework. But that would probably require setting android studio, frida, emulator and I am kinda lazy so let's try to find way around it.</p>
<p>If we look at CFG in Ghidra we can actually see full function, even parts that are deemed unreachable. If we select those parts of code they will actually decompile as undefined functions. Now this is step foward, but still variables are not connected to declarations in real <code>checkFlag</code> and for such large function this is problematic. </p>
<p>So let's try to understand why Ghidra is thinking this part is unreachable
In decompiled code of check flag we have few <code>Exception</code> declarations:</p>
<div class="highlight"><pre><span></span><code><span class="w"> </span><span class="n">ref_05</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="k">new</span><span class="p">(</span><span class="n">IllformedLocaleException</span><span class="p">);</span>
<span class="w"> </span><span class="n">uVar3</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="n">ref_05</span><span class="p">.</span><span class="o"><</span><span class="n">init</span><span class="o">></span><span class="p">();</span>
<span class="w"> </span><span class="n">throwException</span><span class="p">(</span><span class="n">ref_05</span><span class="p">);</span>
<span class="w"> </span><span class="k">return</span><span class="w"> </span><span class="p">(</span><span class="kt">boolean</span><span class="p">)</span><span class="n">uVar3</span><span class="p">;</span>
</code></pre></div>
<p>Which seems really weird considering that these returns are never going to be hit (and btw Ghidra for now is not good at handling try/catch in Java). So we have to dive deeper, which in this case means we have to take looka at smali code.</p>
<h3 id="smali">Smali</h3>
<p>First lets look at few smali constructs:</p>
<p>try/catch:</p>
<div class="highlight"><pre><span></span><code> :try_start_0
[ some code inside try catch block]
:try_end_0
.catch Ljava/lang/Exception; {:try_start_0 .. :try_end_0} :catch_0
[ some code code after try/catch block]
:catch_0
move-exception v1
[some exception handling code]
</code></pre></div>
<p>There is also <code>catch_all</code> label usually used for finally blocks</p>
<p>Goto is not there in Java itself, but it exists at bytecode level and it can be used to obfuscate. Goto:</p>
<div class="highlight"><pre><span></span><code> goto :label_1
[... some code that will be skipped...]
:label_1
[... some code ...]
</code></pre></div>
<p>conditional</p>
<div class="highlight"><pre><span></span><code> if-ne v0, v1, :cond_0
[... some code that will be executed if v0 and v1 are equal...]
:cond_0
[... some code that will be executed if v0 and v1 are not equal...]
</code></pre></div>
<p>To get smali from upos.apk we can use apktool:</p>
<div class="highlight"><pre><span></span><code>//extract apk to folder and convert classes.dex to smali files
apktool d upos
//compile smali files back to classes.dex and generates new apk in upos/dist/
apktool b upos/
</code></pre></div>
<p>FC.smali is file containing <code>checkFlag</code> method:</p>
<p>If we find where error is generated in smali we have:</p>
<div class="highlight"><pre><span></span><code> new-instance v10, Ljava/util/IllformedLocaleException;
invoke-direct {v10}, Ljava/util/IllformedLocaleException;-><init>()V
.end local v3 # "fs":[Z
.end local v4 # "s":Lcom/mobisec/upos/Streamer;
.end local v6 # "idx":I
.end local p0 # "ctx":Landroid/content/Context;
.end local p1 # "fl":Ljava/lang/String;
throw v10
:try_end_f
.catch Ljava/util/IllformedLocaleException; {:try_start_f .. :try_end_f} :catch_9
....
:catch_9
move-exception v0
move-object v5, v0
move v10, v6
goto/16 :goto_9
</code></pre></div>
<p>Which is basically obfuscated way just to jump to <code>:goto_9</code>. We can just replace this code with:</p>
<div class="highlight"><pre><span></span><code> .end local v3 # "fs":[Z
.end local v4 # "s":Lcom/mobisec/upos/Streamer;
.end local v6 # "idx":I
.end local p0 # "ctx":Landroid/content/Context;
.end local p1 # "fl":Ljava/lang/String;
goto/16 :goto_9
:try_end_f
.catch Ljava/util/IllformedLocaleException; {:try_start_f .. :try_end_f} :catch_9
</code></pre></div>
<p>After rebuilding classes.dex with this changes Ghidra was able to connect previously unreachable blocks and we get proper output.</p>
<p>This trick is used on few other exceptions in <code>checkFlag</code> and we can just do same procedure for all of them:</p>
<div class="highlight"><pre><span></span><code>RejectedExecutionException
CertificateEncodingException
GeneralSecurityException
</code></pre></div>
<p>We just need to find places where we are sure exception is getting generated, find appropriate catch handler and then just patch out <code>throw</code> with appropriate <code>goto</code>. Same obfuscation is also done in <code>lm</code> function.</p>
<p>Now we can look at the <code>checkFlag</code> function in total <a href="https://github.com/F3real/ctf_solutions/blob/master/2019/mobisec/upos/checkFlag.java">here</a>.</p>
<p>It's 307 line function, but if we look carefully most of the code are just red herrings made to slow us down. Real check is just from line 260 to the end (and also we have to count <em>exact</em> number of <code>streamer.step()</code> calls).</p>
<p>Since code is large I'll just write a simplified pseudo code of check:</p>
<div class="highlight"><pre><span></span><code><span class="w"> </span><span class="n">flag8</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="n">flag</span><span class="p">.</span><span class="nf">substring</span><span class="p">(</span><span class="mi">8</span><span class="p">)</span>
<span class="w"> </span><span class="k">while</span><span class="w"> </span><span class="n">i</span><span class="w"> </span><span class="o"><</span><span class="w"> </span><span class="mi">30</span><span class="err">:</span>
<span class="w"> </span><span class="k">ref</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="nc">char</span><span class="p">(</span><span class="n">i</span><span class="p">)</span><span class="w"> </span><span class="o">+</span><span class="w"> </span><span class="nc">char</span><span class="p">(</span><span class="n">i</span><span class="o">+</span><span class="mi">1</span><span class="p">)</span>
<span class="w"> </span><span class="n">do_some_streamer_steps</span><span class="p">()</span>
<span class="w"> </span><span class="n">x</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="n">streamer</span><span class="p">.</span><span class="n">g2</span><span class="p">()</span>
<span class="w"> </span><span class="n">y</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="n">streamer</span><span class="p">.</span><span class="n">g2</span><span class="p">()</span>
<span class="w"> </span><span class="n">l</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="n">convert_to_num</span><span class="p">(</span><span class="n">shifts_letter_a_bit</span><span class="p">(</span><span class="k">ref</span><span class="p">))</span>
<span class="w"> </span><span class="k">if</span><span class="w"> </span><span class="n">l</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="n">m</span><span class="o">[</span><span class="n">x</span><span class="o">][</span><span class="n">y</span><span class="o">]</span><span class="err">:</span>
<span class="w"> </span><span class="n">bool_array</span><span class="o">[</span><span class="n">i</span><span class="o">]</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="k">True</span>
<span class="w"> </span><span class="n">i</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="n">i</span><span class="w"> </span><span class="o">+</span><span class="w"> </span><span class="mi">1</span>
<span class="w"> </span><span class="n">hash</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="n">flag</span><span class="p">(</span><span class="n">hash</span><span class="p">)</span>
<span class="w"> </span><span class="k">if</span><span class="w"> </span><span class="n">hash</span><span class="w"> </span><span class="o">==</span><span class="w"> </span><span class="n">true_flag_hash</span>
<span class="w"> </span><span class="k">return</span><span class="w"> </span><span class="k">true</span>
</code></pre></div>
<p><code>m</code> is actually array loaded from <code>lotto.dat</code> asset. </p>
<p>We can just copy this part of flag check and create local version used to find flag. Numerical value generated by two letter combination is unique, this means we can just generate all of them, calculate resulting values and compare them to values asked in flag check to get flag.</p>
<p>I've also added solver in Java to repo with upos.apk.</p>
<p>Flag:
<code>MOBISEC{Isnt_this_a_truly_evil_undebuggable_piece_of_sh^W_software??}</code></p>
<h2 id="loadme">Loadme</h2>
<p>This is kinda expected challenge and it's about <code>DexClassLoader</code>.</p>
<p>We have apk calling server, getting new apk form it, loading it and calling <code>load</code> method from new apk.
This new apk will load <code>logo.png</code> from first apk, decrypt it (just xor), load that apk and call <code>checkFlag</code> from it.</p>
<p>There are few encrypted strings we have to get around it but since keys and methods to decrypt are in apk itself it's not a big problem.</p>
<p><code>context.getPackageName()</code> used in some decryptions is actually same as APPLICATION_ID from BuildConfig.</p>
<p>If we use Jadx to decompile 3rd apk we get flag in plain text.</p>
<p>Flag:
<code>MOBISEC{dynamic_code_loading_can_make_everything_tricky_eh?}</code></p>
</div>
<footer class="text-right">
<p>- F3real</p>
</footer>
<div id="show-comments" class="span7 text-center">
<a href="https://f3real.github.io/mobisec_ctf2.html#disqus_thread"
data-disqus-identifier="mobisec_ctf2"
class="btn btn-primary twitchy-background">Show Comments</a>
</div>
<section id="comments" class="comments hidden">
<hr/>
<h2>Comments</h2>
<div id="disqus_thread"></div>
<noscript>Please enable JavaScript to view the <a href="http://disqus.com/?ref_noscript">comments powered by
Disqus.</a></noscript>
<a href="http://disqus.com" class="dsq-brlink">comments powered by <span class="logo-disqus">Disqus</span></a>
</section>
</div>
</div>
</article>
</section>
<footer>
<hr>
<div class="row">
<div class="col-lg-10 text-center">
<p><small>
Built by <a href="http://docs.getpelican.com/en/latest">Pelican</a> / <a href="https://github.com/F3real/pelican-twitchy">pelican-twitchy</a>
· © 2024 F3real
</small></p>
</div>
</div>
</footer> </div>
</div>
<!-- /#page-content-wrapper -->
</div>
<!-- /#wrapper -->
<!-- disqus -->
<script type="text/javascript">
/* * * CONFIGURATION VARIABLES: EDIT BEFORE PASTING INTO YOUR WEBPAGE * * */
var disqus_shortname = 'https-f3real-github-io'; // required: replace example with your forum shortname
var disqus_identifier = 'mobisec_ctf2';
var disqus_url = 'https://f3real.github.io/mobisec_ctf2.html';
var disqus_config = function () {
this.language = "en";
};
var commentsDiv = document.getElementById('show-comments');
commentsDiv.onclick = function() {
/* * * DON'T EDIT BELOW THIS LINE * * */
(function () {
var dsq = document.createElement('script');
dsq.type = 'text/javascript';
dsq.async = true;
dsq.src = '//' + disqus_shortname + '.disqus.com/embed.js';
(document.getElementsByTagName('head')[0] || document.getElementsByTagName('body')[0]).appendChild(dsq);
})();
this.style.display = 'none';
};
</script>
<!-- /disqus -->
<script>
const wrapper = document.getElementById('wrapper');
const sidebarBig = document.getElementById('sidebar-wrapper');
const sidebarSmall = document.getElementById('sidebar-wrapper-small');
const triggers = Array.from(document.querySelectorAll('[data-toggle="collapse"]'));
for (var i = 0; i < triggers.length; i++) {
triggers[i].addEventListener('click', (ev) => {
const elm = ev.currentTarget;
ev.preventDefault();
const selector = elm.getAttribute('href').replace('#','');
elm.classList.toggle('collapsed');
document.getElementById(selector).classList.toggle('show');
}, false);
}
function showBigNav() {;
sidebarBig.style.display = 'block';
sidebarSmall.style.display = 'none';
}
function showSmallNav() {
sidebarBig.style.display = 'none';
sidebarSmall.style.display = 'block';
}
const mediaQuery = window.matchMedia('(min-width:768px)');
mediaQuery.onchange = e => {
if (wrapper.classList.contains('toggled')) {
wrapper.classList.remove('toggled');
} else {
if (e.matches) {
showBigNav();
} else {
showSmallNav();
}
}
}
function setNavbar() {
var condition = wrapper.classList.contains('toggled');
if (!mediaQuery.matches) {
condition = !condition;
}
if (condition) {
showSmallNav();
} else {
showBigNav();
}
}
function toggleMenu(){
wrapper.classList.toggle('toggled');
setNavbar();
}
window.onload = setNavbar;
</script>
<script data-goatcounter="https://f3real.goatcounter.com/count"
async src="//gc.zgo.at/count.js"></script>
</body>
</html>