← Back to home
Android APK Reversing dex2jar Smali CTF

Android Reversing: InsecureBankv2 & KGB Messenger

Mar 15, 2022

Android APK reverse engineering on InsecureBankv2 and KGB Messenger CTF: Java extraction, smali modification and access control bypass.

1. InsecureBankv2

d2j-dex2jar.bat classes.dex   # Extract Java source
# Fix: android:exported="false" in Manifest
# Recompile & reinstall to verify

2. KGB Messenger CTF

# Bypass locale check in MainActivity.smali
# Change if-nez jumps: cond_0 → cond_1, cond_2 → cond_3
# Find credentials in strings.xml (Base64 encoded)
# User: Stearling Archer | Pass: Guest (social engineering)