Sharif University CTF 2016 : Android App
How to solve
Decompile libadnjni.so
using IDA or Ghidra to collect a characters of flag.
'e'+chr(0x66)+chr(0x35)+chr(0x37)+chr(0x66)+chr(0x33)+chr(0x66)+chr(0x65)+chr(0x33)+chr(99)+chr(0x66)+chr(0x36)+chr(0x30)+chr(0x33)+chr(99)+chr(0x30)+chr(0x33)+chr(0x38)+chr(0x39)+chr(0x30)+chr(0x65)+chr(0x65)+chr(0x35)+chr(0x38)+chr(0x38)+chr(0x38)+chr(0x37)+chr(0x38)+chr(99)+chr(0x30)+chr(0x65)+'c'
Combine them, and enter it to the app by running APK file on simulator (on Android Studio).
Flag
Sharif_CTF{833489ef285e6fa80690099efc5d9c9d}