I’ve playing with Android CTF questions recently and found this jewelry box. One of the questions was about a numeric one way hash question named NUMDROID. The question was presented in ASIS2014 and here, I write the write-up!
This the second and final writeup of Android challenges which was given in 8st Sharif CTF. I’ve wrote about the team and place in the previous post. The writeup begins …
I’ve met 2048 game many years ago. It is an addictive game witch takes lots of time from the player. 🙁
So what should I do if I want to have high score and save time? Here is where Smali takes part. 🙂
In this post I will describe how to inject into Android 2048 game and change the score! Continue reading Smali Code Injection: Playing with 2048!
In the next weeks, two sessions about web application vulnerabilities and Android Analysis and Code Injection will be held at Urmia University CERT.
You may register to the event through its registration link HERE.
In this post I wanted to demonstrate a simple code injection example in Android. As indicated in previous posts about reversing java, the method of code execution is same in Android. Whereas Java, the BYTE CODE are SMALI codes here and the executor is Dalvik (recently ART) in Android (not JVM). Here in this post, I will describe shortly how to reverse and inject code in SMALI.