Activity 1
Signing an APK File and downloading 'EMM - Vulnerable App'
Scenario:
Jack and Jill are friends who trust each other. Jack is using an app in her cellphone which asks for a username and password. Jill wants to surprise Jack with her hacking skills. So, she wants to modify this app in a way that puts the input username and password in the log and send them to a prepared server.
Catch The Flags (CTF) :
The whole process to capture Jack's login credentials is divided into multiple activities each with a challenge to capture flags.
Approximate Time required for all Activities: 2 Hours 30 Minutes
Signing an APK File and downloading 'EMM - Vulnerable App'
Disassembling APK File, Adding Trojan Code and Re-building App
Re-signing modified APK, Sending through Email and Installing
Setting up Server and Monitoring the Device Logs
Setting up Server and Monitoring the Device Logs