Daily Archives: September 9, 2015

FLARE On Challenge (2015) #7

This challenge is a .NET application. There are many tools to decompile a .NET application and here I use the ILSpy. A quick look at the decompile result I found that this application is probably obfuscated by SmartAssembly : There … Continue reading

Posted in CTF | Tagged , , , | Comments Off on FLARE On Challenge (2015) #7

FLARE On Challenge (2015) #6

This challenge is an Android application. There are a lot of tools can be used to analyze Android application and the JEB Decompiler is my favorite one. Let’s open this challenge in JEB and look at the Manifest file at … Continue reading

Posted in CTF | Tagged , , , | Comments Off on FLARE On Challenge (2015) #6

FLARE On Challenge (2015) #5

This challenge is an easy one. It contains two files, one is a Windows Portable Executable file and another one is a PCAP file. Let’s look at the PCAP file at first: In the PCAP file we can see a … Continue reading

Posted in CTF | Tagged , , , | Comments Off on FLARE On Challenge (2015) #5

FLARE On Challenge (2015) #4

File youPecks is a 32 bit Windows Portable Executable file packed with UPX (according to the section name). And it can be unpacked with the UPX utility: When executes the unpacked file, it only prints out a strange expression “2 … Continue reading

Posted in CTF | Tagged , , , | Comments Off on FLARE On Challenge (2015) #4

FLARE On Challenge (2015) #3

The first thing you may noticed for this challenge is that the file size is much larger than the previous challenges, it is about 12 MB! However, from the section table we can find that the size of the PE image … Continue reading

Posted in CTF | Tagged , , , | Comments Off on FLARE On Challenge (2015) #3