Skip to main content

Posts

Showing posts from February, 2019

OWASP crackme write up version 1 level 2 !(•̀ᴗ•́)و ̑̑ (day 12)

From the previous posts i have showed all of you three different approach to solve owasp crackme level 1 problem. Now it's time to level up the challenge! lets try to solve the owasp crackme LEVEL 2 ! To solve this level the first few steps is same with the level 1, you need to get the java source code using reverse engineer tool  (procyon, fernflower or enjarify) in order to know the flow of the application in deeper manner. Once you got the code go to the Mainactivity.java (located in /sg/vantagepoint/ folder) file to see the main execution of the program like the figure below. if you take a look there are two function inside the Mainactivity.java. Inside the onCreate function it is same with the 1st challenge it has a debugging and root checking to prevent user for tamper with program execution and second function is the verify function that check with user input with the secret string. The second function using the "a" method from the "m" class to