An open API service indexing awesome lists of open source software.

https://github.com/schwartzblat/pork_ctf


https://github.com/schwartzblat/pork_ctf

Last synced: 5 months ago
JSON representation

Awesome Lists containing this project

README

          

## Pork ctf

This is a CTF challenge I made for fun.
Finding the vulnerability is pretty hard, but exploiting it is super easy once you understand the
vuln.

# The challenge:

There is a simple notes server that allows you to create, read and delete notes.

The server runs on a regular android application, and the notes are stored in the app file-system.

Your goal is to get the flag from the ADMIN user notes.

## Running the challenge:

1. Build the android app using Android Studio or ./gradlew assemble or download the pre-built apk
from the releases.
2. Install the app on an android emulator or device.
3. Run the app regularly and the server will be started.

## Given details:

1. The admin username is "ADMIN".
2. It can be solved.

## Common setup problems:

1. Make sure you change the cmake version in the ./app/build.gradle to the one you have installed.
2. You can run logcat to see the logs of the app, also you can run `netstat -ate` to check if the
server is running.
3. I have tested the challenge on a Samsung Galaxy S8+ Android 9 real device. If the challenge
doesn't work on
your device please let me know. **UPDATE**: I have tested the challenge on a Pixel 39 Android 14
emulator and it's fine.

## Solvers:

| Name | GMT |
|:------------------------------------:|:----------------:|
| YL | 11.1.2025, 10:08 |
| [Ed Lustig](https://linktr.ee/DTR4K) | 12.1.2025, 9:03 |

## Writeups:

Here is my own writeup for the challenge:
[My Writeup](https://schwartzblat.github.io/posts/pork-ctf-writeup/)

## Contact:

Having a problem with the challenge?

Got the flag in a special way?

Wanna check if you're on the right path?

Contact me at [alon.ponch@gmail.com](mailto:alon.ponch@gmail.com).

## Credits:

Only to me :)