Writeup

The challenge starts by providing us with a APK file, in which I immediately installed it onto my Genymotion Android VM Emulator (just use the free edition will do) with the adb tool. Upon loading the app, it presents itself with a login interface, prompting me to key in the username and password:

Next, as part of my mobile app testing framework, I will decompile the mobile app using two tools:

  • apktool (android decompilation to smali code)
apktool d challenge.apk
  • jadx (decompile to smali code and map it to Java code)
jadx -d $(PWD)/jadx-output challenge.apk

I’d like to take this opportunity to say something to the challenge developer:

Thank you for NOT obfuscating the APK file.

It was honestly brutal when I had to go through obfuscated apps over my years as a security consultant.

As we were presented with a login page, the first instinctive thing to do is to figure out the login functionality and how it works. A quick grep of the login keyword within the jadx output and it directs the user to this file (put filename here):

First thing that came up to my mind was: “what the hell is Amplify”? A quick Google search and what I got was this:

OOOOOOO~~~ So it’s actually a backend framework for mobile/web applications, and it’s powered by Amazon Web Services. :D

Not gonna lie, ever since I left consultancy and went to teaching, I have never come across mobile apps that leverage on AWS Identity Access Management as the backbone of user authentication. So this would definitely be a first time for me.

The login mechanism relies heavily on AWS, and this can be seen by the captured web traffic via Burp Suite when attempting to log in with bogus credentials:

From here it was pretty much a dead end when I can’t proceed past this login page without valid credentials. All hope was lost, until I saw this within the Android XML resource files:

Wait, seriously? -_-”

Normally resources within the strings.xml file contain text values that are eventually used as part of the Android application. But this, is HIGHLY unusual. Wonder if it works…

YA KNOW? A classic case of a typical mistake done by developers to clear out previous user credentials :)

Now after logging in, the hint provided was a really obvious one. 3 repetitions to the letter S, and in addition to that, we also have prior knowledge that the mobile app utilises the AWS infrastructure. SOOO… Amazon + 3 ‘S’ characters = Amazon S3?

Anyway, for us to access any authenticated S3 storage buckets, we would need these information:

  • AWS Access ID
  • AWS Access Secret Key
  • AWS Region

If we look at our Burp Proxy traffic, the following HTTP response was received when we successfully logged into the mobile application:

All you need now is to use the AWS S3 CLI (if you’re on Linux, setting this up is easy as hell) by following these steps:

  1. Install AWS CLI (Check this website for more info: https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html)
  2. Configure an AWS CLI profile with the access ID, key/token and region (I created a separate profile as I too have other AWS keys to manage):
aws --profile stf22 configure

  1. if all configurations are correct and well, run the following command and you should be able to see multiple S3 buckets:
aws --profile stf22 s3 ls

HMMMM. Seems like it’s not working T_T. After reading the documentation, it turns out that i also need to include the AWS session token as well. For this you will need to find the ‘credentials’ file and add it yourself:

After further analysis of listing the buckets, only one contained the flag.

Fetching the flag was relatively easy:

aws s3 --profile stf22 cp s3://stfflag2/flag2.txt flag2.txt

Simply view the contents of the file and voila, you have the flag:

Thoughts

I can totally understand how this challenge is considered to be “easy”, provided that you know about these two concepts:

  • Android App Analysis (Static and Dynamic)
  • Familiarisation with Amazon Web Services and its various cloud services (AWS IAM, S3)

I was expecting this challenge to have some form of Dynamic Binary Instrumentation (DBI) stuff like using Frida to perform method overriding, but I guess sometimes the best way to solve it is when the solution is simple and straightforward. No need to be so fancy.

I guess the only thing I can brag about this challenge is that my group was the one that got first blood, but i didn’t take photo evidence of it. UGH!