MISTasks/Technical/picoCTF/t1/q5.md

13 lines
687 B
Markdown
Raw Permalink Normal View History

2024-11-05 18:13:44 +05:30
# Question: Mob psycho
### Key: picoCTF{ax8mC0RU6ve_NX85l4ax8mCl_52a5e2de}
**Core concept: SHA256 Hash**
We're given an APK file. Since they're essentially zip files, I unzipped it using `unzip mobpsycho.apk -d ayan` to unzip it in the custom directory ayan.
Then, I run `eza -T` to get the tree of all the files in the directory. Running through them, I find a flag.txt. I navigate to the directory; /res/color/.
I run `cat flag.txt` to get the flag. But it's a random string. I tried decoding it thriough a couple of cyphers, and found that it is hex. So, I ran `xxd -r -p flag.txt` to get the flag in hex.
Voila! Found the flag!
Output: picoCTF{ax8mC0RU6ve_NX85l4ax8mCl_52a5e2de}