HackTheBox | Angler - trigger intent & hooking function arguments with Frida
🔥 CTF Challenge Walkthrough: Angler 🔥 🕹️ CTF Platform: Hack The Box 📁 Difficulty: Medium 💻 Category: Mobile, Frida, Native Library Analysis Huge thanks to Tomisec for this fun and insightful challenge! 📝 Video Overview: In this video, we dive into Angler, an Android mobile challenge on Hack The Box. We begin by analyzing the APK and discover a broadcast receiver listening for the BATTERY_LOW intent. After triggering the intent via ADB, we explore logcat hints that lead us to a native library (libangler.so). Using Ghidra for reverse engineering and Frida for dynamic analysis, we hook into the native strcmp function to extract the flag from memory. This challenge is a great intro to Android internals, Frida scripting, and native code hooking! 📚 Useful Resources: Write-up : https://anuragtaparia.gitbook.io/write-ups/mobile/htb-or-angler Android BroadcastReceiver Reference: http://developer.android.com/reference/android/content/BroadcastReceiver.html# Frida Documentation: https://frida.re/docs/home/ 🔔 Stay Connected: Follow for more mobile security challenges, Android analysis, and reverse engineering walkthroughs. 👉 Don’t forget to like, subscribe, and hit the notification bell to stay updated on my latest videos!
Download
0 formatsNo download links available.