Phone Siapa Ni?
On this page
Description
The attachment given is a zip file containing all the files and folders as shown above.
Solution
The goal of this challenge is to find the name of the owner. I started with looking through AndroidManifest.xml
as it normally contains basic information of the app (feel free to correct me cuz I am not too familiar with Android reverse engineering XD). However, the file appears abnormal to me as it is not in readable text.
After going through some research, I found out that it is a binary XML file, and we can use parser to parse it into readable format. However, the content doesn’t look useful for me.
After some researching, I found out that classes.dex
files might be useful as it contains the classes files. We can get the source code of the application from it.
Using Kali Linux tool d2j-dex2jar
, we can convert dex files into jar files so that it is readable. From classes3.dex
, we will be able to find the main source code of the app. We can see that there is a Google Drive link which contains a name list. Looking through the source code, we can see that it is comparing user input to a SHA256 hash.
So, we can create a script to generate hashes for the names in the name list, and compare with the hash from the source code to get the name.