We are Recruiting!

Yes! We are actively recruiting individuals from the MD/DC/VA area for both online, on-site, and wireless CTFs.

To join our team solve this simple puzzle/captcha to find our New Member Orientation which contains a link to our discord server.

aHR0cHM6Ly9nb28uZ2wvNjJFVmpD


Monday, March 2, 2015

PragyanCTF - Android - Hackerz

When first getting this file, we were a little unsure about what steps to take for this challenge. As this was my first time attempting an Android based challenge I used the Googles for ideas.
While one team member was working on getting the circle.apk file to work with an emulator to see if that would provide us with any insight into the challenge I decided to work on unpacking the apk file as not to duplicate efforts. 


Using 7zip, apktool, and dex2jar I was able to unpack the circle.apk file.


Using the dex2jar tool I was able to extract the classes.dex file:


Unpacking the .jar file I was given a new directory /com. After looking around I didn't see anything useful. I went back to the apktool and decompiled the circle.apk into a new directory.

After running the decompile, I looked in my new directory which led to more directories:
After changing into many sub directories I finally I reached the end of the rabbit hole which contained a few smali files. I started looking at each one for anything considered “interesting”.


In the b.smali file I noticed some base64 encoding:


Copying that into a new file called test.txt, I decoded the base64:


We see our decoded base64 is the flag: y0u_4r3_4_h4ck3r



About Crimson Agents

Formed in 2013, Crimson Agents is a DC based recreational security team that competes in various computer security wargames and hacker jeopardy contests. Our team comprised of various professionals seeking to practice and enhance our skills in penetration testing, vulnerability development, computer network defense, forensics, and reverse engineering. In addition to exploitation based CTFs, we also compete in Wireless CTFs with several members who focus solely in this domain. Our sister team Threat Inc focuses on defensive exercises such as malware analysis, forensics, honeypots, and network captures. We reuse what we learn from our "Blue Team" research to make our "Red Team" operations more effective and vice-versa.