This is again "another" way to crack the owasp crack me challenge, but this time i used xposed framework to bypass the function authentication. Before using the xposed framework, you guys remember that the application has a root detection method inside the main function that will prevent us to hook into the method using xposed framework, to circumvent the check of the root detection i tamper the smali code of the application like the figure below. as you can see i tamper three function of the root checker inside the main function. This 3 function is equivalent to this source code: if (c.a() || c.b() || c.c()) { this.a("Root detected!"); } repackage the application and install it to the rooted vm or rooted device. Because we already taking care of the root detection now its time to move on to the xposed framework. This is the code i write to bypass the au...
Talk about Binary Analysis and Android Mobile security | I Create THINGS that Break THINGS :D