Knightctf2k25_knight's_Droid_writeup....
Category :- Reverse Engineering
Solutions :-
Step 1 :-
Download the task file [knights_droid.zip].
Step 2 :-
Decompile the [.apk] using an online decompiler. Alternatively, you can use another tool.
Step 3 :-
Look in com > knightctf.knights_droid and examine the
SecretKeyVerifier function.
Step 4 :-
We can see an encrypted string:
GYPB{ykjcnwp5_GJECDP_u0q_c0p_uKqN_Gj1cd7_zN01z}, which appears to use a Caesar cipher encryption. I decrypted it using Cryptii. By shifting the encrypted string [-4], I decrypted it successfully.
Flag :-
KCTF{_congrat5_KNIGHT_y0u_g0t_yOuR_Kn1gh7_dR01d_}
![Knight's Droid CTF Complete Writeup KnightCTF 2025 knightdroid - Decompile the [.apk] using an online decompiler](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhblTaPtdEMus7a39u7EtKxuFvEleUPYDpzBjQovAXZ4y0suFjU4UIBwdJSVkZRZ5NzXPwljuwFj_Xv6MhkhjY7JLD_Ug14EuUzNV7GHPMYWxBDJPjPjXu-p0OwZ8UBv06WZ42SSrjFNMfuT4c40NJg0ZgBKOen_y76ynyEhPEA-sXAg9QfWJYOT8hAJXTa/w640-h380/stepF1.png)



0 Comments