ICSCTF Simple Guess

Description I asked for the challenge from other people so I have no idea what the description is. SimpleGuess.apk Static Analysis As usual, I just start analyzing with jadx-gui. I started with the AndroidManifest.xml. 1 2 3 4 5 6 7 8 9 10 <activity android:theme="@style/Theme.SimpleGuess" android:label="@string/app_name" android:name="com.example.simpleguess.MainActivity" android:exported="true"> <intent-filter> <action android:name="android.intent.action.MAIN"/> <category android:name="android.intent.category.LAUNCHER"/> </intent-filter> </activity> There’s only one activity named MainActivity so I just look into this. ...

June 30, 2025 · 4 min · 775 words

MHL Config Editor

Challenge Description Welcome to the Config Editor Challenge! In this lab, you’ll dive into a realistic situation involving vulnerabilities in a widely-used third-party library. Your objective is to exploit a library-induced vulnerability to achieve RCE on an Android application. configeditor.apk Solution As usual, I started out by performing static analysis to read the code. Static Analysis I started by looking into the AndroidManifest.xml. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 <activity android:name="com.mobilehackinglab.configeditor.MainActivity" android:exported="true"> <intent-filter> <action android:name="android.intent.action.MAIN"/> <category android:name="android.intent.category.LAUNCHER"/> </intent-filter> <intent-filter> <action android:name="android.intent.action.VIEW"/> <category android:name="android.intent.category.DEFAULT"/> <category android:name="android.intent.category.BROWSABLE"/> <data android:scheme="file"/> <data android:scheme="http"/> <data android:scheme="https"/> <data android:mimeType="application/yaml"/> </intent-filter> </activity> There’s only one activity and it has a intent filter which accept URI parameter. ...

April 9, 2025 · 4 min · 757 words

MHL Note Keeper

Challenge Description Welcome to the NoteKeeper Application, where users can create and encode short notes. However, lurking within the app is a critical buffer overflow vulnerability. Your mission is to uncover this vulnerability and exploit it to achieve remote code execution. notekeeper.apk Solution I started out by performing static analysis to look into the code Static Analysis I started out by looking into the AndroidManifest.xml. 1 2 3 4 5 6 7 8 <activity android:name="com.mobilehackinglab.notekeeper.MainActivity" android:exported="true"> <intent-filter> <action android:name="android.intent.action.MAIN"/> <category android:name="android.intent.category.LAUNCHER"/> </intent-filter> </activity> There’s only one activity at the moment so lets look into it. ...

April 8, 2025 · 11 min · 2323 words