Tag Archives: FLARE On

FLARE On Challenge (2015) #2

The file of challenge 2 named very_success, it is a 32 bit Windows Portable Executable file which probably written in Assembly Language. The workflow of this program is very similar to the i_am_happy_you_are_to_playing_the_flareon_challenge.exe in challenge 1. It will read a … Continue reading

Posted in CTF | Tagged , , , | Comments Off on FLARE On Challenge (2015) #2

FLARE On Challenge (2015) #1

When you analyze a file, the first thing is probably to understand the type of the file. If you are familiar with Windows, I believe you can recognize the file type of the first challenge just by looking at its icon: Yes, … Continue reading

Posted in CTF | Tagged , , , | Comments Off on FLARE On Challenge (2015) #1

Second FireEye FLARE On Challenge (2015) Solutions

The FLARE On Challenge is a CTF-style event held by the FireEye Labs Advanced Reverse Engineering (FLARE) team. This year there are total 11 challenges covered many aspects of reverse engineering like unpacking, deobfuscation, network traffic analysis and algorithm recognition. … Continue reading

Posted in CTF | Tagged , , , , , , | Comments Off on Second FireEye FLARE On Challenge (2015) Solutions