Mobile Reverse Engineering Challenge: Unraveling the Code

We are super excited to announce the launch of a brand-new mobile reverse engineering challenge! This challenge, focused on Android apps, invites participants to dive deep into the intricacies of APK files, reverse engineering a function named F. It’s a fantastic opportunity to sharpen your skills and tackle real-world security problems.

enter image description here

In this challenge, participants will be tasked with reversing a specific function extracted from an Android APK file. You will start with an easier stage, gradually working your way up to more complex scenarios. The target function, named F, is invoked with specific arguments, and your objective is to reverse engineer the function and determine its returned value.

The challenge will provide you with essential resources, such as the Android manifest file and various assets that may or may not be referenced by the function F. You will also have access to code snippets in Java or Smali, giving you insights into how the function operates under the hood.

  • AndroidManifest.xml
  • strings.xml
  • Challenge.java
  • Challenge.smali

This exercise starts at an easy level but quickly progresses to a medium difficulty, testing your analytical and technical skills as you navigate through the inner workings of Android application security. The goal is to uncover how the function F processes its inputs and outputs, using reverse engineering techniques.

So, are you ready to reverse engineer function F and reveal its hidden logic?

Happy hacking, and may the best hackers rise to the top!