Skip to main content

Posts

Featured

ph0wn CTF 2017 Write-up: Misc/helpxman - Stage 2 and 3

After successfully getting the flag of  Stage 1 , the challenge told us to continue looking for something interesthing from the app. After playing around with the app's UI, we found nothing special and decided to look into the  internal  of the app. By saying  internal  we meant: let's reverse the source code of the application! Get the application's APK file from the glasses. Connect the glasses with the computer as described in  Stage 1 List all current application installed in the smart glasses: > adb shell pm list packages ... package:ph0wn.reconjet ... => We can easily identify the app we are looking for is  package:ph0wn.reconjet With the package name found, we can find the actual filename and the location of the APK file: > adb shell pm path ph0wn.reconjet package:/data/app/ph0wn.reconjet-1/base.apk ( Author's note:  When writing this write-up, I have to run the app again on my phone, so the path appear above migh...

Latest Posts

ph0wn CTF 2017 Write-up: Misc/helpxman - Stage 1

CSAW 2017 CTF Write-up: Web littlequery

CSAW 2017 CTF Write-up: Web orange v1

Shellcode that bring back tty input

Gingerbread (Android 2.3.3) for Nexus One - GRI40

Latest of Android 2.2 Froyo - FRF72

How to change SMSC number of Android

Auto-shutdown for Linux machine

Setting proxy for Android by GUI (official way)

How to get EMMA code coverage of Android