Android security workshop taught at the CyberTruck Challenge 2022 (Michigan USA). Further info at https://www.cybertruckchallenge.org
A new mobile remote keyless system "CyberTruck" has been implemented by one of the most well-known car security companies "NowSecure Mobile Vehicles". The car security company has ensured that the system is entirely uncrackable and therefore attackers will not be able to recover secrets within the mobile application.
If you are an experienced Android reverser, then enable the tamperproof
button to harden the application before unlocking your cars. Your goal will consist on recovering up to 6 secrets in the application.
The content is provided in folders such as:
slides
: Presentation during the Android workshop (~2h)docker
: Docker image with all tools readyapk
: Final Android crackme APK which can unlock up to 3 vehicles.src
: Source code of the crackmenotes
: Additional notes, troubleshooting, and so onsolutions
: Possible solutions to the crackme (x86 and Aarch64)student
: JS code provided as template to write your Frida hooksimg:
: Screenshots of the crackme running on the Android emulator
It is required to have an Android device either emulated or physical. During the workshop we employed an AVD running Android 11 that it can be obtained for free with Android Studio. Additionally, the tamperproof check needs to have the Frida server binary placed in /data/local/tmp/frida-server
.
-
50pts
: There is a secret used to create a DES key. Can you tell me which one? -
100pts
: There is a token generated at runtime to unlock the carid=1. Can you get it? (flag must be submitted in hexa all lowercase)
-
50pts
: This challenge has been obfuscated with ProGuard, therefore you will not recover the AES key. -
100pts
: There is a token generated at runtime to unlock the carid=2. Can you get it? (flag must be submitted in hexa all lowercase)
-
50pts
: There is an interesting string in the native code. Can you catch it? -
100pts
: Get the secret generated at runtime to unlock the carid=3. Security by obscurity is not a great design. Use real crypto! (hint: check the length when submitting the secret!)
Eduardo Novella [email protected]
- verso.se (by Joan Calabrés)
- bugbountywriteup (by Harshit Maheshwari)
- GitHub (By James Stevenson)
- GitHub.io (by Nibarius)
- GitHub.io (native layer) (by Nibarius)
- alp.run (by Alp Eren)