https://github.com/schwartzblat/pork_ctf
https://github.com/schwartzblat/pork_ctf
Last synced: 5 months ago
JSON representation
- Host: GitHub
- URL: https://github.com/schwartzblat/pork_ctf
- Owner: Schwartzblat
- Created: 2025-01-04T17:23:15.000Z (12 months ago)
- Default Branch: main
- Last Pushed: 2025-02-08T17:06:43.000Z (11 months ago)
- Last Synced: 2025-04-13T14:36:02.597Z (8 months ago)
- Language: C++
- Homepage:
- Size: 107 KB
- Stars: 18
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
## Pork ctf
This is a CTF challenge I made for fun.
Finding the vulnerability is pretty hard, but exploiting it is super easy once you understand the
vuln.
# The challenge:
There is a simple notes server that allows you to create, read and delete notes.
The server runs on a regular android application, and the notes are stored in the app file-system.
Your goal is to get the flag from the ADMIN user notes.
## Running the challenge:
1. Build the android app using Android Studio or ./gradlew assemble or download the pre-built apk
from the releases.
2. Install the app on an android emulator or device.
3. Run the app regularly and the server will be started.
## Given details:
1. The admin username is "ADMIN".
2. It can be solved.
## Common setup problems:
1. Make sure you change the cmake version in the ./app/build.gradle to the one you have installed.
2. You can run logcat to see the logs of the app, also you can run `netstat -ate` to check if the
server is running.
3. I have tested the challenge on a Samsung Galaxy S8+ Android 9 real device. If the challenge
doesn't work on
your device please let me know. **UPDATE**: I have tested the challenge on a Pixel 39 Android 14
emulator and it's fine.
## Solvers:
| Name | GMT |
|:------------------------------------:|:----------------:|
| YL | 11.1.2025, 10:08 |
| [Ed Lustig](https://linktr.ee/DTR4K) | 12.1.2025, 9:03 |
## Writeups:
Here is my own writeup for the challenge:
[My Writeup](https://schwartzblat.github.io/posts/pork-ctf-writeup/)
## Contact:
Having a problem with the challenge?
Got the flag in a special way?
Wanna check if you're on the right path?
Contact me at [alon.ponch@gmail.com](mailto:alon.ponch@gmail.com).
## Credits:
Only to me :)