From 3592acc12f3cb995955c1b0b462f2ebcfee8e2cc Mon Sep 17 00:00:00 2001 From: Aadit Agrawal Date: Tue, 5 Nov 2024 18:13:44 +0530 Subject: [PATCH] Add Technical/picoCTF/t1/q5.md --- Technical/picoCTF/t1/q5.md | 13 +++++++++++++ 1 file changed, 13 insertions(+) create mode 100644 Technical/picoCTF/t1/q5.md diff --git a/Technical/picoCTF/t1/q5.md b/Technical/picoCTF/t1/q5.md new file mode 100644 index 0000000..3583dde --- /dev/null +++ b/Technical/picoCTF/t1/q5.md @@ -0,0 +1,13 @@ +# Question: Mob psycho +### Key: picoCTF{ax8mC0RU6ve_NX85l4ax8mCl_52a5e2de} + +**Core concept: SHA256 Hash** + +We're given an APK file. Since they're essentially zip files, I unzipped it using `unzip mobpsycho.apk -d ayan` to unzip it in the custom directory ayan. +Then, I run `eza -T` to get the tree of all the files in the directory. Running through them, I find a flag.txt. I navigate to the directory; /res/color/. + +I run `cat flag.txt` to get the flag. But it's a random string. I tried decoding it thriough a couple of cyphers, and found that it is hex. So, I ran `xxd -r -p flag.txt` to get the flag in hex. + +Voila! Found the flag! + +Output: picoCTF{ax8mC0RU6ve_NX85l4ax8mCl_52a5e2de} \ No newline at end of file