Description

TISC 2024 Challenge 8, titled “WallFacer,” is an APK reverse engineering challenge that requires bypassing multiple walls through patching. While it is possible to solve this challenge using tools like Frida to manipulate process memory, I opted for the route of directly patching the APK.

Throughout this challenge, I gained deeper insight into repackaging APKs by modifying the binary. Reflecting on previous encounters with mobile malware samples, patching binaries to bypass security mitigations is not uncommon. Attackers often need to circumvent additional security measures and integrity checks. This challenge has given me a greater appreciation for the techniques involved.

Setup

Emulator (RootAVD)

I set up a typical Android emulator environment using rootAVD, running on x86-64 Windows.

rootAVD.bat system-images\android-35\google_apis_playstore\x86_64\ramdisk.img

The Initial Look

MainActivity

The challenge begins with the MainActivity of the APK.

Inspecting the AndroidManifest.xml file reveals two activities: com.wall.facer.MainActivity and com.wall.facer.query.

<?xml version="1.0" encoding="utf-8"?>
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
    android:versionCode="1"
    android:versionName="1.0"
    android:compileSdkVersion="34"
    android:compileSdkVersionCodename="14"
    package="com.wall.facer"
    platformBuildVersionCode="34"
    platformBuildVersionName="14">
    <uses-sdk
        android:minSdkVersion="33"
        android:targetSdkVersion="34"/>
    <permission
        android:name="com.wall.facer.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION"
        android:protectionLevel="signature"/>
    <uses-permission android:name="com.wall.facer.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION"/>
    <application
        android:theme="@style/Theme.Wallfacer"
        android:label="@string/app_name"
        android:icon="@mipmap/ic_launcher"
        android:name="com.wall.facer.app"
        android:allowBackup="true"
        android:supportsRtl="true"
        android:extractNativeLibs="false"
        android:fullBackupContent="@xml/backup_rules"
        android:roundIcon="@mipmap/ic_launcher_round"
        android:appComponentFactory="androidx.core.app.CoreComponentFactory"
        android:dataExtractionRules="@xml/data_extraction_rules">
        <activity
            android:name="com.wall.facer.query"
            android:exported="true"/>
        <activity
            android:name="com.wall.facer.MainActivity"
            android:exported="true">
            <intent-filter>
                <action android:name="android.intent.action.MAIN"/>
                <category android:name="android.intent.category.LAUNCHER"/>
            </intent-filter>
        </activity>
        <provider
            android:name="androidx.startup.InitializationProvider"
            android:exported="false"
            android:authorities="com.wall.facer.androidx-startup">
            <meta-data
                android:name="androidx.emoji2.text.EmojiCompatInitializer"
                android:value="androidx.startup"/>
            <meta-data
                android:name="androidx.lifecycle.ProcessLifecycleInitializer"
                android:value="androidx.startup"/>
            <meta-data
                android:name="androidx.profileinstaller.ProfileInstallerInitializer"
                android:value="androidx.startup"/>
        </provider>
        <receiver
            android:name="androidx.profileinstaller.ProfileInstallReceiver"
            android:permission="android.permission.DUMP"
            android:enabled="true"
            android:exported="true"
            android:directBootAware="false">
            <intent-filter>
                <action android:name="androidx.profileinstaller.action.INSTALL_PROFILE"/>
            </intent-filter>
            <intent-filter>
                <action android:name="androidx.profileinstaller.action.SKIP_FILE"/>
            </intent-filter>
            <intent-filter>
                <action android:name="androidx.profileinstaller.action.SAVE_PROFILE"/>
            </intent-filter>
            <intent-filter>
                <action android:name="androidx.profileinstaller.action.BENCHMARK_OPERATION"/>
            </intent-filter>
        </receiver>
    </application>
</manifest>

Decompilation of MainActivity

At first glance, MainActivity appears simple and doesn’t seem to provide much useful information. However, it plays a crucial role later in the challenge.

package com.wall.facer;
 
import android.os.Bundle;
import android.view.View;
import android.widget.EditText;
import defpackage.C0;
 
/* loaded from: classes.dex */
public class MainActivity extends C0 {
    public EditText y;
 
    @Override // defpackage.C0, defpackage.O3, android.app.Activity
    public final void onCreate(Bundle bundle) {
        super.onCreate(bundle);
        setContentView(R.layout.activity_main);
        this.y = (EditText) findViewById(R.id.edit_text);
    }
 
    public void onSubmitClicked(View view) {
        Storage.getInstance().saveMessage(this.y.getText().toString());
    }
}

Query Activity

Switching from MainActivity

To switch between MainActivity and query, use the following commands:

# Get to query 
adb shell am start -n com.wall.facer/.query
 
# Get to main activity
adb shell am start -n com.wall.facer/.MainActivity

Switching to the query activity prompts for a key and IV value.

Decompilation

Decompiling the query activity shows that it requires a key and IV for AES encryption in CBC mode.

package com.wall.facer;
 
import android.content.Context;
import android.os.Bundle;
import android.util.Base64;
import android.util.Log;
import android.view.View;
import android.widget.EditText;
import defpackage.C0;
import javax.crypto.Cipher;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;
 
/* loaded from: classes.dex */
public class query extends C0 {
    public EditText y;
    public EditText z;
 
    @Override // defpackage.C0, defpackage.O3, android.app.Activity
    public final void onCreate(Bundle bundle) {
        super.onCreate(bundle);
        setContentView(R.layout.activity_query);
        this.y = (EditText) findViewById(R.id.key_text);
        this.z = (EditText) findViewById(R.id.iv_text);
    }
 
    public void onSubmitClicked(View view) {
        Context applicationContext = getApplicationContext();
        String obj = this.y.getText().toString();
        String obj2 = this.z.getText().toString();
        try {
            byte[] decode = Base64.decode(applicationContext.getString(R.string.str), 0);
            byte[] bytes = obj.getBytes();
            byte[] bytes2 = obj2.getBytes();
            Cipher cipher = Cipher.getInstance("AES/CBC/PKCS5Padding");
            cipher.init(2, new SecretKeySpec(bytes, "AES"), new IvParameterSpec(bytes2));
            Log.d(getString(R.string.tag), "Decrypted data: ".concat(new String(cipher.doFinal(decode))));
        } catch (Exception unused) {
            Log.e(getString(R.string.tag), "Failed to decrypt data");
        }
    }
}

Encrypted Flag

The encrypted flag is Base64 encoded and can be found in res/values/strings.xml.

<string name="str">4tYKEbM6WqQcItBx0GMJvssyGHpVTJMhpjxHVLEZLVK6cmIH7jAmI/nwEJ1gUDo2</string>

Sqlite.db is database… or is it?

Examining the strings in the XML file, we find a Base64 value. Decoding it gives us wallowinpain.

There’s also a Base64 encoded string for sqlite.db.

Tracing the ID of the string filename leads to K0.smali. Interestingly, the decompilation for this function failed.

Interestingly, the decompilation for this function failed.

However, by searching the smali code for the loading of this constant, we identify its usage.

    const v0, 0x7f0f0038   <_----------- BASE64 of "sqlite.db"
 
    :try_start_0
    invoke-virtual {p0, v0}, Landroid/content/Context;->getString(I)Ljava/lang/String;
 
    move-result-object v0
 
    new-instance v1, Ljava/lang/String;
 
    const/4 v2, 0x0
 
    invoke-static {v0, v2}, Landroid/util/Base64;->decode(Ljava/lang/String;I)[B
 
    move-result-object v0
 
    invoke-direct {v1, v0}, Ljava/lang/String;-><init>([B)V
 
    invoke-static {p0, v1}, LA8;->K(Landroid/content/Context;Ljava/lang/String;)Ljava/nio/ByteBuffer;
 
    move-result-object v0
 
    new-instance v1, Ldalvik/system/InMemoryDexClassLoader;
 
    invoke-virtual {p0}, Landroid/content/Context;->getClassLoader()Ljava/lang/ClassLoader;
 
    move-result-object v2
 
    invoke-direct {v1, v0, v2}, Ldalvik/system/InMemoryDexClassLoader;-><init>(Ljava/nio/ByteBuffer;Ljava/lang/ClassLoader;)V
 
    const-string v0, "DynamicClass"
 
    invoke-virtual {v1, v0}, Ljava/lang/ClassLoader;->loadClass(Ljava/lang/String;)Ljava/lang/Class;
 
    move-result-object v0
 
    const-class v1, Landroid/content/Context;
 
    filled-new-array {v1}, [Ljava/lang/Class;
 
    move-result-object v1
 
    const-string v2, "dynamicMethod"
 
    invoke-virtual {v0, v2, v1}, Ljava/lang/Class;->getMethod(Ljava/lang/String;[Ljava/lang/Class;)Ljava/lang/reflect/Method;
 
    move-result-object v0
 
    filled-new-array {p0}, [Ljava/lang/Object;
 
    move-result-object p0
 
    const/4 v1, 0x0
 
    invoke-virtual {v0, v1, p0}, Ljava/lang/reflect/Method;->invoke(Ljava/lang/Object;[Ljava/lang/Object;)Ljava/lang/Object;
    :try_end_0
    .catch Ljava/lang/Exception; {:try_start_0 .. :try_end_0} :catch_0
 
    return-void

Sqlite.db as Encrypted DEX File

In the previous smali snippet, the base64 string of sqlite.db was loaded to constant before it was decoded to sqlite.db string. A InMemoryDexClassLoader was then instantiated, which loads sqlite.db as a class and run after it was being decrypted via A8.K(context, "sqlite.db").

    invoke-static {v0, v2}, Landroid/util/Base64;->decode(Ljava/lang/String;I)[B
 
    move-result-object v0
 
    invoke-direct {v1, v0}, Ljava/lang/String;-><init>([B)V
 
    invoke-static {p0, v1}, LA8;->K(Landroid/content/Context;Ljava/lang/String;)Ljava/nio/ByteBuffer;
 
    move-result-object v0
 
    new-instance v1, Ldalvik/system/InMemoryDexClassLoader;

Decrypting Sqlite.db content

The sqlite.db file is actually an encrypted DEX file. The decryption routine reads the file, extracts the length of the encrypted data and the key, and then performs RC4 decryption.

Data Structure of Sqlite.db

Ultimately, this is what the sqlite.db file contain:

DataLength(bytes)Description
Unused0x1000Unused sqlite header and more
Length of Enc. Data0x4How much data to get for decryption
Key0x80RC4 Key
Encrypted DataLength of Enc. DataEncrypted Dex file
public static ByteBuffer K(Context context, String str) {
        int i2;
        InputStream open = context.getAssets().open(str);
        ByteArrayOutputStream byteArrayOutputStream = new ByteArrayOutputStream();
        byte[] bArr = new byte[1024];
        while (true) {
            int read = open.read(bArr);
            if (read == -1) {
                break;
            }
            byteArrayOutputStream.write(bArr, 0, read);
        }
        open.close();
        byte[] byteArray = byteArrayOutputStream.toByteArray(); 
 
        // RC4 KEY
        byte[] bArr2 = new byte[128];
        // Encrypted Data Length
        byte[] bArr3 = new byte[4];
 
        System.arraycopy(byteArray, 4096, bArr3, 0, 4);
        int i3 = ByteBuffer.wrap(bArr3).getInt(); // Length of encrypted Data
        byte[] bArr4 = new byte[i3];
        System.arraycopy(byteArray, 4100, bArr4, 0, i3);
        System.arraycopy(byteArray, 4100 + i3, bArr2, 0, 128);
        C0289q1 c0289q1 = new C0289q1(bArr2);
        byte[] bArr5 = new byte[i3];
        int i4 = 0;
        int i5 = 0;
        for (i2 = 0; i2 < i3; i2++) {
            i4 = (i4 + 1) & 255;
            byte[] bArr6 = (byte[]) c0289q1.c;
            byte b2 = bArr6[i4];
            i5 = (i5 + (b2 & 255)) & 255;
            bArr6[i4] = bArr6[i5];
            bArr6[i5] = b2;
            bArr5[i2] = (byte) (bArr6[(bArr6[i4] + b2) & 255] ^ bArr4[i2]);
        }
        return ByteBuffer.wrap(bArr5);
    }
 
 
...
...
    public C0289q1(byte[] bArr) {   // RC4 Routine
        this.a = 17;
        this.b = bArr;
        this.c = new byte[256];
        for (int i = 0; i < 256; i++) {
            ((byte[]) this.c)[i] = (byte) i;
        }
        int i2 = 0;
        for (int i3 = 0; i3 < 256; i3++) {
            byte[] bArr2 = (byte[]) this.c;
            byte b = bArr2[i3];
            byte[] bArr3 = (byte[]) this.b;
            i2 = (i2 + (b & 255) + (bArr3[i3 % bArr3.length] & 255)) & 255;
            bArr2[i3] = bArr2[i2];
            bArr2[i2] = b;
        }
    }
 

Full Script to Decrypt sqlite.db

To extract, we will need to extract the key and length of the encrypted data before performing RC4. Decrypting this file would allow us to place this in Jadx for further analysis.

class RC4:
    def __init__(self, key):
        self.S = list(range(256))
        self.key = key
        self.key_length = len(key)
        self.i = 0
        self.j = 0
        self._ksa()
 
    def _ksa(self):
        j = 0
        for i in range(256):
            j = (j + self.S[i] + self.key[i % self.key_length]) % 256
            self.S[i], self.S[j] = self.S[j], self.S[i]
 
    def crypt(self, data):
        result = bytearray()
        for byte in data:
            self.i = (self.i + 1) % 256
            self.j = (self.j + self.S[self.i]) % 256
            self.S[self.i], self.S[self.j] = self.S[self.j], self.S[self.i]
            K = self.S[(self.S[self.i] + self.S[self.j]) % 256]
            result.append(byte ^ K)
        return result
 
def K(file_data):
    # Read 4 bytes from offset 0x1000 (4096)
    arr_b3 = file_data[0x1000:0x1000 + 4]
    v2 = int.from_bytes(arr_b3, byteorder='big')
    
    # Read v2 bytes from offset 4100
    arr_b4 = file_data[4100:4100 + v2]
    
    # Read 128 bytes from offset 4100 + v2
    arr_b2 = file_data[4100 + v2: 4100 + v2 + 128]
    if len(arr_b2) != 128:
        raise ValueError("Key length is not 128 bytes")
    
    # Initialize RC4 cipher with the key
    rc4 = RC4(arr_b2)
    
    # Decrypt the data
    arr_b5 = rc4.crypt(arr_b4)
    
    return arr_b5
 
 
# Read the encrypted file into a byte array
with open('sqlite.db', 'rb') as f:
    file_data = f.read()
 
# Decrypt the data
decrypted_data = K(file_data)
 
# Use the decrypted data as needed
print(decrypted_data)
 
f = open("decrypted_sqlite.db","wb")
f.write(decrypted_data)
f.close()

Quick Check

Opening the decrypted file shows that it is indeed a DEX file, and we see references to the Storage class and hints of a libnative.so file.

Message Polling

Decompiling the decrypted sqlite.db reveals two messages that are polled from the Storage class. By supplying these messages in the MainActivity, we can generate the native library libnative.so (Message: I am a tomb) and run the native method (Message: Only Advance). Monitoring logs with adb logcat | Select-String TISC helps find relevant messages.

The two messages are:

  • I am a tomb
10-20 06:35:45.385  6944  6958 I TISC    : Tomb message received!
10-20 06:35:45.584  6944  6958 I TISC    : Native library loaded!
  • Only Advance
10-20 06:40:11.801  6944  6958 I TISC    : Advance message received!
10-20 06:40:11.802  6944  6958 D TISC    : There are walls ahead that you'll need to face. They have been specially designed to always result in an
error. One false move and you won't be able to get the desired result. Are you able to patch your way out of this mess?
10-20 06:40:11.802  6944  6958 E TISC    : I need a very specific file to be available. Or do I?
10-20 06:40:11.803  6944  6958 E TISC    : HAHAHA are you sure you've got the right input parameter?
10-20 06:40:11.803  6944  6958 D TISC    : Bet you can't fix the correct constant :)
10-20 06:40:11.803  6944  6958 E TISC    : I'm afraid I'm going to have to stop you from getting the correct key and IV.
10-20 06:40:11.803  6944  6958 E TISC    : Not like this...
10-20 06:40:11.803  6944  6958 D TISC    : The key is: z?<NKKf7m?MUg&>qBp"b9G$A!bzP&0I(
10-20 06:40:11.803  6944  6958 D TISC    : The IV is: apI3`ipq.?3d!t#6

Decompilation of Decrypted sqlite.db

We can see the message polling implementation in the following:

package defpackage;
...
...
 
/* loaded from: C:\Users\user\Desktop\TISC2024\wallfacer\wallfacer-x86_64.apk_Decompiler.com\resources\assets\decrypted_sqlite.db */
public class DynamicClass {
    static final /* synthetic */ boolean $assertionsDisabled = false;
    private static final String TAG = "TISC";
 
    public static native void nativeMethod();
 
    public static void dynamicMethod(Context context) throws Exception {
        pollForTombMessage();
        Log.i(TAG, "Tomb message received!");
        File generateNativeLibrary = generateNativeLibrary(context);
        try {
            System.load(generateNativeLibrary.getAbsolutePath());
        } catch (Throwable th) {
            String message = th.getMessage();
            message.getClass();
            Log.e(TAG, message);
            System.exit(-1);
        }
        Log.i(TAG, "Native library loaded!");
        if (generateNativeLibrary.exists()) {
            generateNativeLibrary.delete();
        }
        pollForAdvanceMessage();
        Log.i(TAG, "Advance message received!");
        nativeMethod();
    }
 
    private static void pollForTombMessage() throws ClassNotFoundException, NoSuchMethodException, InvocationTargetException, IllegalAccessException {
        Class<?> cls;
        do {
            SystemClock.sleep(1000L);
            cls = Class.forName("com.wall.facer.Storage");
        } while (!DynamicClass$$ExternalSyntheticBackport1.m((String) cls.getMethod("getMessage", new Class[0]).invoke(cls.getMethod("getInstance", new Class[0]).invoke(null, new Object[0]), new Object[0]), "I am a tomb"));
    }
 
    private static void pollForAdvanceMessage() throws ClassNotFoundException, NoSuchMethodException, InvocationTargetException, IllegalAccessException {
        Class<?> cls;
        do {
            SystemClock.sleep(1000L);
            cls = Class.forName("com.wall.facer.Storage");
        } while (!DynamicClass$$ExternalSyntheticBackport1.m((String) cls.getMethod("getMessage", new Class[0]).invoke(cls.getMethod("getInstance", new Class[0]).invoke(null, new Object[0]), new Object[0]), "Only Advance"));
    }
 
    ...
    ...
}

Generating libnative.so

The challenge requires generating libnative.so by decrypting files in the assets/data folder using the password wallowinpain.

  1. Collect all filenames in the assets/data folder and sort them in ascending order.
  2. For each of these files:
    • Extract the salt from the filename (after the $), appending == for Base64 padding.
    • Use the password wallowinpain to decrypt the file content using AES-GCM`.
    • Append the decrypted content to reconstruct libnative.so.

Decompilation

public static File generateNativeLibrary(Context context) throws ClassNotFoundException, NoSuchMethodException, InvocationTargetException, IllegalAccessException, IOException {
        AssetManager assets = context.getAssets();
        Resources resources = context.getResources();
        
        // dir is base64 encoded "data" which refers to the directory in the assets folder
        String str = new String(Base64.decode(resources.getString(resources.getIdentifier("dir", "string", context.getPackageName())) + "=", 0));
        String[] list = assets.list(str);
        Arrays.sort(list, new Comparator() { // from class: DynamicClass$$ExternalSyntheticLambda3
            @Override // java.util.Comparator
            public final int compare(Object obj, Object obj2) {
                int m;
                m = DynamicClass$$ExternalSyntheticBackport0.m(Integer.parseInt(((String) obj).split("\\$")[0]), Integer.parseInt(((String) obj2).split("\\$")[0]));
                return m;
            }
        });
 
        // base is base64 encoded "wallowinpain" according to strings.xml
        // wallowinpain is also the key for the decrypting libnative.so
        String str2 = new String(Base64.decode(resources.getString(resources.getIdentifier("base", "string", context.getPackageName())), 0));   
        File file = new File(context.getFilesDir(), "libnative.so");
        Method method = Class.forName("Oa").getMethod("a", byte[].class, String.class, byte[].class);
        FileOutputStream fileOutputStream = new FileOutputStream(file);
        try {
            for (String str3 : list) {
                InputStream open = assets.open(str + str3);
                byte[] readAllBytes = open.readAllBytes();
                open.close();
                fileOutputStream.write((byte[]) method.invoke(null, readAllBytes, str2, Base64.decode(str3.split("\\$")[1] + "==", 8)));
            }
            fileOutputStream.close();
            return file;
        } catch (Throwable th) {
            try {
                fileOutputStream.close();
            } catch (Throwable th2) {
                Throwable.class.getDeclaredMethod("addSuppressed", Throwable.class).invoke(th, th2);
            }
            throw th;
        }
    }
 
 
...
...
 
/* loaded from: classes.dex */
public class Oa {
    public static byte[] a(byte[] bArr, String str, byte[] bArr2) {
        byte[] b = b(str, bArr2);
        Cipher cipher = Cipher.getInstance("AES/GCM/NoPadding");
        byte[] bArr3 = new byte[12];
        int length = bArr.length - 12;
        byte[] bArr4 = new byte[length];
        System.arraycopy(bArr, 0, bArr3, 0, 12);
        System.arraycopy(bArr, 12, bArr4, 0, length);
        cipher.init(2, new SecretKeySpec(b, "AES"), new GCMParameterSpec(128, bArr3));
        return cipher.doFinal(bArr4);
    }
 
    private static byte[] b(String str, byte[] bArr) {
        return SecretKeyFactory.getInstance("PBKDF2WithHmacSHA256").generateSecret(new PBEKeySpec(str.toCharArray(), bArr, 16384, 256)).getEncoded();
    }
}

Full Script to Regenerate libnative.so

import java.io.*;
import java.security.NoSuchAlgorithmException;
import java.util.Base64;
import java.util.*;
import java.security.spec.InvalidKeySpecException;
 
import javax.crypto.Cipher;
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.GCMParameterSpec;
import javax.crypto.spec.PBEKeySpec;
import javax.crypto.spec.SecretKeySpec;
public class NativeLibReconstructor {
 
    public static void main(String[] args) {
        // path to data files
        String path = "data/";
        String base = "wallowinpain";
        String data_path = "./assets/data/";
        String libnative_so_path = "./assets/libnative.so";
 
 
        // open output stream of libnative_so
        FileOutputStream libnative_so = null;
        try {
            libnative_so = new FileOutputStream(libnative_so_path);
        } catch (FileNotFoundException e) {
            e.printStackTrace();
        }
 
        // enumerate teh files present in data path 
        File folder = new File(data_path);
        File[] listOfFiles = folder.listFiles();
        Arrays.sort(listOfFiles, new Comparator<File>() {
            public int compare(File f1, File f2) {
                return Long.valueOf(f1.lastModified()).compareTo(f2.lastModified());
            }
        });
        // iterate over the files
        //print out hte filenames
        for( File file : listOfFiles) {
 
            // Read the file content into encrypted_data_arr_b for decrypt_a
            byte[] encrypted_data_arr_b = null;
            try {
                FileInputStream fileInputStream = new FileInputStream(file);
                encrypted_data_arr_b = new byte[(int) file.length()];
                fileInputStream.read(encrypted_data_arr_b);
                fileInputStream.close();
                
                // split the file name with $ adn print only the parts after the $
                String[] parts = file.getName().split("\\$");
                // for each of that file name after the $, i want to read the content and AES GCM decrypt it
                // just want to print out the file name only after the $
                String resource_filename = parts[1] + "==";
                resource_filename = resource_filename.replace("-", "+").replace("_", "/");
                byte[] decrypted_bytes = null;
                try {
                    decrypted_bytes = decrypt_a(encrypted_data_arr_b, base, Base64.getDecoder().decode(resource_filename));
                } catch (NoSuchAlgorithmException e) {
                    e.printStackTrace();
                }
 
                // append the decrypted bytes into the libnative_so stream
                try {
                    libnative_so.write(decrypted_bytes);
                } catch (IOException e) {
                    e.printStackTrace();
                }
 
                // print out the decrypted_bytes first 20 bytes
                System.out.println(new String(decrypted_bytes).substring(0, 20));
 
 
            } catch (IOException e) {
                e.printStackTrace();
            }
 
        }
 
        //close the libnative_so stream
        try{
            libnative_so.close();
        } catch (IOException e){
            e.printStackTrace();
        }
    }
 
     public static byte[] decrypt_a(byte[] encrypted_data_arr_b, String s, byte[] arr_b1) throws NoSuchAlgorithmException {
        // catcjh NoSuchAlgorithmException;
        Cipher aesGcmCipher_cipher0 ;
        byte[] cipher_text_arr_b4 = null;
        try{
            
            byte[] secret_key_arr_b2 = generate_secret_key_b(s, arr_b1);
            byte[] iv_arr_b3 = new byte[12];
 
            int cipher_textlength_v = encrypted_data_arr_b.length - 12;
            cipher_text_arr_b4 = new byte[cipher_textlength_v];
            System.arraycopy(encrypted_data_arr_b, 0, iv_arr_b3, 0, 12);
            System.arraycopy(encrypted_data_arr_b, 12, cipher_text_arr_b4, 0, cipher_textlength_v);
            GCMParameterSpec gCMParameterSpec0 = new GCMParameterSpec(0x80, iv_arr_b3);
            aesGcmCipher_cipher0 = Cipher.getInstance("AES/GCM/NoPadding");
            aesGcmCipher_cipher0.init(2, new SecretKeySpec(secret_key_arr_b2, "AES"), gCMParameterSpec0);
            return aesGcmCipher_cipher0.doFinal(cipher_text_arr_b4);
        } catch (Exception e) {
            e.printStackTrace();
        }
        return new byte[0]; // Return an empty byte array in case of an exception
    }
 
    private static byte[] generate_secret_key_b(String s, byte[] arr_b) {
        try {
            return SecretKeyFactory.getInstance("PBKDF2WithHmacSHA256").generateSecret(new PBEKeySpec(s.toCharArray(), arr_b, 0x4000, 0x100)).getEncoded();
        } catch (NoSuchAlgorithmException | InvalidKeySpecException e) {
            e.printStackTrace();
            return new byte[0]; 
        }
    }
}

Analyzing NativeMethod from libnative.so

After generating libnative.so, we can verify its contents.

“I need a very specific file to be available. Or do I?”

The program attempts to open /sys/wall/facer using sys_openat. Since this file doesn’t exist, the syscall fails. To bypass this check, we patch the result of the syscall (eax value to 0).

After patching:

Understanding the jump tables is crucial. By patching the eax value to 0, we pass this stage and proceed with the proper calculation of the IV and Key.

Patching the Syscall

Throughout this challenge, we would be dealing with jump tables which pays to keep track especially in the last wall. Let’s take a look of how such jump table work here.And how patching out eax value to 0 help us to pass this stage with the proper calculation of IV and Key.

Second Wall

In the second wall, a function checks if a parameter equals 0x539 or 1337. By default, the parameter is 1.

.text:0000000000001F78                 mov     edi, 1          ; unsigned int
.text:0000000000001F7D                 call    sub_3430

Patch 1 to 1337

Before patching:

After patching:

Flow after the patch:

Third Wall

In the third wall, there is a check for the first parameter to be 0x539. By tracking the jump table and understanding the control flow, we identify where to patch.

In this wall, there is a check for the first parameter again to see if the value is 1337 or 0x539. To understand the flow, tracking of jump table helps greatly if we are not analyzing this dynamically. Additionally, nearing the jump statement, there are some jump table information that is being stored on the stack which has been illustrated in the leftmost side of the following figure:

Patching points

We need to ensure the first parameter to the function sub_35B0 is 0x539. We patch the code to force the sum to be 0x539.

Wall 3 Patch 1 - Sum to 0x539

Before patching:

After patching:

Wall 3 Patch 2 - Compare to 0x539

Before:

After:

The whole Flow for Third Wall

  • First Parameter Check (POINT A)
    • Initially, the first parameter is checked if it is 0x539
    • If it is not, it would not set ecx to 0 which is the index to failure from the jump table (POINT C).

    We NEED first parameter to be 0x539 to set ecx to allow us to jump to the next stage of this wall (POINT B).

  • Based on the previously initialized stack, we know that the index of the jump table to use is 13. Therefore, we would move to sub_3779 (POINT D)
    • There is then another check once again to see if the first parameter is 0x539. If yes, then set index to zero for the upcoming jump table to jump to sub_3743 (POINT E).
    • We do not want to go to the other route.
  • In sub_3779, there is another comparison with the first parameter with the value 0xa13, however, we have determined that the first parameter should be 0x539.
    • Eventually, we want rcx to be 1 to win. However, we have to make sure that the first parameter should be equal to 0xA13 which we will be patching to 0x539 instead. (POINT F)

Script for the Patch

import sys
data = None
with open("libnative.so.original", 'rb') as f:
    data = f.read()
 
buffer = bytearray(data)
 
# Patch the buffer
patch_dict = {
    0x227B: [0x31, 0xc0],  # return non negative value and xor eax for wall1
    0xf79 : [0x39, 0x05],  # set the value of 1337 for wall2
    0x11e6 : [0x90]*4  + [0x48, 0xC7, 0xC0, 0x39, 0x05, 0x00, 0x00, 0x89, 0x85, 0x74, 0xFF, 0xFF, 0xFF, 0x90,0x90,0x90] + [0x90]*4 , # Wall 3,
    0x0BAC : [0x39, 0x05], # for wall 3 this is the constant that we change. and first parameter should already be 1337
}
 
for addr, values in patch_dict.items():
    for i, value in enumerate(values):
        buffer[addr + i] = value   
        # print the above stateement to show the patching process
        print(f"buffer[{hex(addr + i)}] = {hex(value)}")
 
# Write the patched buffer to a new file
with open("libnative.so", 'wb') as f:
    f.write(buffer)

Modifying the APK

Replacing libnative.so

In order to flag, I have re-encrypted the libnative.so file before rebuilding the APK.

I reversed the action by encrypting the libnative.so file into one file instead of splitting using wallowinpain and placing back into the data folder with the appropriate file name.

import java.io.File;
import java.io.FileInputStream;
import java.io.FileOutputStream;
import java.io.IOException;
import java.security.NoSuchAlgorithmException;
import java.security.SecureRandom;
import java.security.spec.InvalidKeySpecException;
import javax.crypto.Cipher;
import javax.crypto.SecretKeyFactory;
import javax.crypto.spec.GCMParameterSpec;
import javax.crypto.spec.PBEKeySpec;
import javax.crypto.spec.SecretKeySpec;
 
public class EncryptNativeLib {
    // Encrypts a file with AES-GCM
    public static void main(String[] args) {
        File file = new File("C:\\Users\\user\\Desktop\\TISC2024\\wallfacer\\wallfacer-x86_64.apk_Decompiler.com\\resources\\decrypt\\final_libnative\\libnative.so");
        String encrypted_libnative = "C:\\Users\\user\\Desktop\\TISC2024\\wallfacer\\wallfacer-x86_64.apk_Decompiler.com\\resources\\decrypt\\final_libnative\\0$aGFoYWhhaGFoYWhhaGFoYQ";
        FileOutputStream encryptedLibnativeStream = null;
 
        try {
            // Output file stream for encrypted libnative
            encryptedLibnativeStream = new FileOutputStream(encrypted_libnative);
        } catch (IOException e) {
            e.printStackTrace();
        }
 
        byte[] plainData = new byte[(int) file.length()];
        try {
            FileInputStream fileInputStream = new FileInputStream(file);
            fileInputStream.read(plainData);
            fileInputStream.close();
        } catch (IOException e) {
            e.printStackTrace();
        }
 
        // Encrypt with AES GCM
        byte[] encryptedData = null;
        try {
            encryptedData = encrypt_a(plainData, "wallowinpain", "hahahahahahahaha".getBytes());
        } catch (NoSuchAlgorithmException e) {
            e.printStackTrace();
        }
 
        // Write encrypted data to the output file
        try {
            if (encryptedLibnativeStream != null) {
                encryptedLibnativeStream.write(encryptedData);
                encryptedLibnativeStream.close();
            }
        } catch (IOException e) {
            e.printStackTrace();
        }
    }
 
    // Encryption method using AES-GCM
    public static byte[] encrypt_a(byte[] plainData, String password, byte[] salt) throws NoSuchAlgorithmException {
        Cipher aesGcmCipher;
        byte[] cipherTextWithIv = null;
        try {
            // Generate the secret key
            byte[] secretKeyBytes = generate_secret_key_b(password, salt);
            SecretKeySpec secretKey = new SecretKeySpec(secretKeyBytes, "AES");
 
            // Generate a random 12-byte IV
            byte[] iv = new byte[12];
            SecureRandom random = new SecureRandom();
            random.nextBytes(iv);
 
            // Initialize GCM parameter spec with 128-bit authentication tag length
            GCMParameterSpec gcmParameterSpec = new GCMParameterSpec(128, iv);
 
            // Initialize the cipher for encryption
            aesGcmCipher = Cipher.getInstance("AES/GCM/NoPadding");
            aesGcmCipher.init(Cipher.ENCRYPT_MODE, secretKey, gcmParameterSpec);
 
            // Perform encryption
            byte[] cipherText = aesGcmCipher.doFinal(plainData);
 
            // Combine IV and ciphertext
            cipherTextWithIv = new byte[iv.length + cipherText.length];
            System.arraycopy(iv, 0, cipherTextWithIv, 0, iv.length);
            System.arraycopy(cipherText, 0, cipherTextWithIv, iv.length, cipherText.length);
 
        } catch (Exception e) {
            e.printStackTrace();
        }
        return cipherTextWithIv != null ? cipherTextWithIv : new byte[0]; // Return the encrypted data with IV
    }
 
    // Generate secret key using PBKDF2 with HMAC SHA-256
    private static byte[] generate_secret_key_b(String password, byte[] salt) {
        try {
            return SecretKeyFactory.getInstance("PBKDF2WithHmacSHA256")
                    .generateSecret(new PBEKeySpec(password.toCharArray(), salt, 0x4000, 256)).getEncoded();
        } catch (NoSuchAlgorithmException | InvalidKeySpecException e) {
            e.printStackTrace();
            return new byte[0]; // Return an empty byte array in case of an exception
        }
    }
}

Repackaging

This is the script used to automate the repackaging of APK.

adb uninstall com.wall.facer
 
del my-aligned.apk
del my.keystore
del wallfacer-x86_64.apk
 
java -jar apktool_2.10.0.jar b wallfacer-x86_64
copy wallfacer-x86_64\dist\wallfacer-x86_64.apk .
"C:\Program Files (x86)\Java\jre1.8.0_421\bin\keytool"  -genkey -v -keystore my.keystore -keyalg RSA -keysize 2048 -validity 10000 -alias app
"C:\Users\user\AppData\Local\Android\Sdk\build-tools\35.0.0\zipalign" -p 4 wallfacer-x86_64.apk my-aligned.apk
 
"C:\Users\user\AppData\Local\Android\Sdk\build-tools\35.0.0\apksigner" sign --ks-key-alias app --ks my.keystore  my-aligned.apk

Retrieving the Flag

Script to automate repackaging:

10-21 05:30:42.028 11977 11988 I TISC    : Tomb message received!
10-21 05:30:42.167 11977 11988 I TISC    : Native library loaded!
...
...
10-21 05:30:46.175 11977 11988 I TISC    : Advance message received!
10-21 05:30:46.175 11977 11988 D TISC    : There are walls ahead that you'll need to face. They have been specially
designed to always result in an error. One false move and you won't be able to get the desired result. Are you able to
patch your way out of this mess?
10-21 05:30:46.176 11977 11988 I TISC    : One wall down!
10-21 05:30:46.176 11977 11988 I TISC    : Input verification success!
10-21 05:30:46.176 11977 11988 D TISC    : Bet you can't fix the correct constant :)
10-21 05:30:46.176 11977 11988 I TISC    : I guess it's time to reveal the correct key and IV!
10-21 05:30:46.177 11977 11988 D TISC    : The key is: eU9I93-L9S9Z!:6;:i<9=*=8^JJ748%%
10-21 05:30:46.177 11977 11988 D TISC    : The IV is: R"VY!5Jn7X16`Ik]

Switch to the query activity:

# Get to query 
adb shell am start -n com.wall.facer/.query

Entering the key and IV reveals the flag in logcat.

10-21 05:33:55.215 11977 11977 D TISC    : Decrypted data: The flag is: TISC{1_4m_y0ur_w4llbr34k3r_!i#Leb}

Flag

TISC{1_4m_y0ur_w4llbr34k3r_!i#Leb}

Conclusion

While there are alternative methods to solve it, such as using memory patching, this write-up showcases the approach I took by directly patching and repackaging the APK. Interestingly, I chanced upon SpaceRaccoon’s Writeup on the use of Unicorn Emulation to solve this challenge as well!