πŸ”¬
CTFs
  • 🚩nitrozeus's CTF Writeups
  • Tutorial
    • Install Windows 10 VM on M1 Mac
  • My Notes
    • Capture-The-Flag
      • Windows Forensics
      • Memory Forensics
      • Base32, Base64
      • Steganography
      • Email Analysis
      • Malware Analysis
      • MD4, MD5 Cracking
      • Social Engineering
      • OSINT
      • Google Dorking
      • Reconnaissance
      • Port Scan (nmap)
  • 2023
    • 🧠BrainHack CDDC 2023
      • Gallery
      • Eazy Network Analysis
      • What the hell happened to the PC?!
      • Audio Steganography
  • 2022
    • 🐱Grey Cat The Flag 2022
      • Parcel
      • Memory Game (Part 1)
      • Too Fast
      • Entry
      • Ghost
      • Firmware
      • Image Upload
      • flappy-js
    • β›΅STANDCON 2022
      • I Sea You (Part 1)
      • Locate Me
      • I Sea You (Part 2)
      • Trolley Trolling
      • A New Gateway
      • Walks like a cat, barks like a dog
      • Shark in the Ocean
      • Atlan Safe P1
      • Gift from Russia
      • Asmuth Shares
      • Memedump
      • Warmup Forensics
    • 🦁STACK the Flags 2022
      • Finding Nyan
      • New Task!
      • Hit you with that
      • Cobalt Struck
      • PyRunner
Powered by GitBook
On this page
  • Solution 1
  • Solution 2
  1. 2022
  2. Grey Cat The Flag 2022

Memory Game (Part 1)

wait, what did i eat for breakfast again?

PreviousParcelNextToo Fast

Last updated 2 years ago

Here's a fun game to destress.

Do you know where the image assets are stored? I've made a nice drawing for you.

MD5 (memory-game.apk) = 1c491c078269748d1abf65dff6449149

Author: daniellimws

For this challenge, there TWO ways to solve this challenge. We will be explaining them both!

We received an file and I got really excited, because I love Android programming! The first thing our team did was to extract the.apk file via .

Solution 1

Do you know where the image assets are stored? I've made a nice drawing for you.

The challenge description gives us a hint where the flag should be located. The TWO keywords here are image assets and drawing.

Flag: grey{th1s_dr4w4bl3_bu7_e4s13r_t0_7yp3}

Solution 2

find "$(cd ..; pwd)" -iname "*flag*"

Flag: grey{th1s_dr4w4bl3_bu7_e4s13r_t0_7yp3}

Having experience Android programming, the flag are probably located in (res -> drawable-hdpi) folder. It is the folder where most images/graphics are stored! From there, we managed to get the flag!!

This solution is similar Firmware's . We will be using command lines to recursively search for the flag!

Gotta eat Omega 3 to boost my memory

🐱
😭
☺️
drawable
πŸŽ‰
APK
apktool
Solution 2
apktool
flag.png
flag!!