Qtnes
Hacker & Malwarenerd
$
posts
$
til
$
whoami
$
search
◑ light
// tags
_android
9 articles
Apr 22 2026
5 min read
BotConf 2026 Android Workshop: A Practical Android Malware Analysis Playbook
A practical walkthrough of the BotConf 2026 Android workshop, covering static analysis, dynamic instrumentation, native libraries, and automation as one workflow.
android
reverse
automation
Apr 17 2026
5 min read
7 - The Mole: Reconstructing an Android Malware Beacon from a PCAP
A packet-capture-driven reverse engineering walk through an Android malware dropper, its SID-based gating logic, and the token chain used to reach the final flag.
android
malware
network-forensics
reverse
ctf
Apr 17 2026
4 min read
8 - Pizzeria: Prompt Injection Against an Android LLM Agent
An Android app, a fake pizza order form, and an LLM backend that could be pushed into calling internal tools through a Unicode-based prompt injection bypass.
android
ai
prompt-injection
reverse
ctf
Apr 16 2026
4 min read
5 - MediterraneanPotions: Decrypting a Flutter App's Encrypted Database
A Flutter app storing all its data in an AES-CBC-encrypted Hive database — finding the key buried in native Dart strings, parsing the binary frame format, and decrypting every record offline.
android
flutter
hive
decryption
frida
ctf
Apr 16 2026
4 min read
6 - DeadDrop: Emulating an MQTT Bot to Recover a Flag
An Android malware sample communicating over MQTT with RC4-encrypted messages — decoding the obfuscated broker config, reversing the protocol, and building a bot emulator to trigger flag delivery.
android
rc4
malware
ctf
Apr 15 2026
6 min read
3 - Smoke: Bypassing StringFog and Decoding a Custom String Cipher
The APK was protected by StringFog — every string literal replaced with an encrypted hex payload decoded at runtime — requiring a Python port of the custom LCG cipher to bulk-decrypt the entire source tree and find the flag.
android
stringfog
obfuscation
decryption
reverse
ctf
Apr 15 2026
4 min read
4 - Handshake: Breaking AES-CBC via IV Recovery and CBC Malleability
A mutual TLS server hands out an AES-CBC-encrypted flag with a hidden IV — the key was in the APK but the IV required either hunting through server-derived values or forging it via CBC malleability.
android
crypto
mtls
ctf
Apr 14 2026
4 min read
1 - GhostMode: Reversing a Native Android CTF Library
An Android challenge that taunts you with a fake flag in static analysis, then hides the real one behind a PIN validator and a runtime decryption loop inside a native library.
android
native
reverse
ctf
Apr 14 2026
4 min read
2- ThePackage: Unpacking a Runtime-Loaded DEX
A packer challenge where the real Java classes are encrypted inside the APK and only decrypted at runtime, requiring extraction and static analysis of the hidden DEX.
android
packing
dex
reverse
ctf