| ID: | 2101 |
|---|---|
| 标题: | tictactoe |
| 描述: | Challenge Details Android app reversing. The app xor decrypts a list of strings into a list of Telegram channel invite links. The channel descriptions contain some values that are used for decrypting more code that are to be executed. Each channel description decrypts a dex module to be executed. One of the dex modules will print out the flag in the logs. The catch is that by default, the app only decrypts and executes the 1st module then stops. The flag printing module is the 18th. Players should either patch/instrument/reverse engineer the app to get the flag from there. |
| 类型: | CTF-2023 |
| 网站: | bugku |
| 题目链接: | https://ctf.bugku.com/challenges/detail/id/2248.html |
| 赛事: | Welcome |
| 年度: | None |
| Flag值: | 翁恺Java井字棋答案 |
| writeup: | https://blog.csdn.net/YY_in_China/article/details/112307652 |