Morty’s New Tool : Android Application Based CTF Challenge Walkthrough
Morty创建了一个中级Android应用CTF挑战,旨在通过逆向工程原生库和动态代码转换等技术学习应用运行机制和数据流。参与者可使用adb、apktool、jadx-gui、Android Studio、Ghidra和Frida等工具进行分析。 2025-9-9 07:16:5 Author: infosecwriteups.com(查看原文) 阅读量:8 收藏

Saurabh Jain

Press enter or click to view image in full size

Morty’s new tool is an intermediate level Android application CTF challenge. The basic aim of this CTF challenge is to learn the dynamic transformation in the code at run time, reverse engineering of native libraries and much more.

It will give an atmosphere of real time scenarios which will teach us the working of an application, its process and data flow.

Let’s take a minute to thank Moksh for creating this challenge. If someone wants to try and solve the challenge before going through the walkthrough, the link for the CTF can be found [here] and the application can be downloaded from [here].

Tools Used :

adb : a command line tool that lets you communicate with device

apktool : command line tool for reverse engineering android applications

jadx-gui : tool for producing Java source code from Android Dex and APK files

Android Studio : official Integrated Development Environment (IDE) for Android app development

Device : Android Device/Android Studio Emulator/Genymotion Emulator

Ghidra : Open source reverse engineering tool

Frida : dynamic code instrumentation toolkit for native applications


文章来源: https://infosecwriteups.com/mortys-new-tool-android-application-based-ctf-challenge-walkthrough-6058e080598e?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh