picoCTF writeup: Decompilation of a simple Android Package
Tags
attack-pattern: Tool - T1588.002
Common Information
Type Value
UUID bf114ade-383d-4c81-9bc5-bb1f9976f55a
Fingerprint b77fd7cb1e850708
Analysis status DONE
Considered CTI value -2
Text language
Published March 29, 2023, 12:27 p.m.
Added to db March 29, 2023, 3:04 p.m.
Last updated Nov. 17, 2024, 7:44 p.m.
Headline picoCTF writeup: Decompilation of a simple Android Package
Title picoCTF writeup: Decompilation of a simple Android Package
Detected Hints/Tags/Attributes 25/1/27
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 167 Cybersecurity on Medium https://medium.com/feed/tag/cybersecurity 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 4127
github.com
Details Domain 53
developer.android.com
Details Domain 45
source.android.com
Details Domain 9
ibotpeaches.github.io
Details Domain 3
unix.stackexchange.com
Details Domain 1
www.pngwing.com
Details Domain 1
www.pxfuel.com
Details Domain 6
play.picoctf.org
Details Domain 4
artifacts.picoctf.net
Details Domain 150
www.w3.org
Details File 3
timer.apk
Details File 172
androidmanifest.xml
Details File 1
c:\users\aleksey\appdata\local\apktool\framework\1.apk
Details File 1
www.png
Details Github username 2
alekseyyy
Details Github username 19
mandiant
Details Url 2
https://github.com/alekseyyy/snhu/tree/main/sundries/ctf/2023/picoctf
Details Url 1
https://developer.android.com/guide/components/fundamentals
Details Url 2
https://source.android.com/docs/core/runtime/dalvik-bytecode
Details Url 3
https://ibotpeaches.github.io/apktool
Details Url 6
https://github.com/mandiant/flare-vm
Details Url 1
https://unix.stackexchange.com/questions/76870/cat-files-in-current-folder-and-all-subfolders
Details Url 1
https://www.pngwing.com/pt/free-png-hlvpg
Details Url 1
https://www.pxfuel.com/en/free-photo-xngbk
Details Url 1
https://play.picoctf.org/events/72/challenges/challenge/381
Details Url 1
https://artifacts.picoctf.net/c/449/timer.apk
Details Url 1
https://www.w3.org/xml