Tags: reversing 

Rating:

# Pizza Pazzi, 150 points

I started by decompiling the apk to be able to analyze it.
To do this, I used the site `http://www.javadecompilers.com/apk`

After downloading the zip that the site returned to me, I started digging through the files and came across:

!["FoodDeliveryApp"](./1.png)

"Food Delivery App", which made me think of... pizza!

After digging around a bit, you quickly find:

`https://pizzapazzi.challenge.hackazon.org/`

Which gives us the first flag:

**Flag 1: CTF{St4RT_Y0uR_3NG1N3X}**

We also find `Q1RGe1doMF80bV9JfQ==` and `Q1RGe1doNHRfMV80bV93MHJ0aH0=`

Which gives us :

**Flag 2: CTF{Wh0_4m_I}**
**Flag 3: CTF{Wh4t_1_4m_w0rth}**

And finally in another file (LoginActivity.java) we find `Q1RGe1doM3JlXzFzX3RoM19mMDBkfQ==`

So :

**Flag 4: CTF{Wh3re_1s_th3_f00d}**

Original writeup (https://github.com/Tartifletteuhh/UnlockTheCityCTF2022-WriteUps-SKBO/tree/master/District3/PizzaPazzi).