MISTasks/Technical/picoCTF/t1/q5.md

687 B

Question: Mob psycho

Key: picoCTF{ax8mC0RU6ve_NX85l4ax8mCl_52a5e2de}

Core concept: SHA256 Hash

We're given an APK file. Since they're essentially zip files, I unzipped it using unzip mobpsycho.apk -d ayan to unzip it in the custom directory ayan. Then, I run eza -T to get the tree of all the files in the directory. Running through them, I find a flag.txt. I navigate to the directory; /res/color/.

I run cat flag.txt to get the flag. But it's a random string. I tried decoding it thriough a couple of cyphers, and found that it is hex. So, I ran xxd -r -p flag.txt to get the flag in hex.

Voila! Found the flag!

Output: picoCTF{ax8mC0RU6ve_NX85l4ax8mCl_52a5e2de}