November 19, 2018 Flare-on 2018 #8: doogie.bin This challenge came only with a .bin-file, and a quick ‘file’ told me this was going to be fun: ctf flareon5
October 18, 2018 Flare-on 2018 #4: binstall.exe The first interesting challenge of 2018 was a simple executable. Initial examination shows it’s a .NET executable, so I turn to dnSpy to get some more information. ctf flareon5
October 17, 2017 Flare-on 2017 #10: shell.php shell.php looked like a webshell you’d find left behind by an attacker. See the bottom of this post for the full challenge code. ctf flareon4
October 17, 2017 Flare-on 2017 #9: remorse.ino.hex The filename ends with ‘ino.hex’, which hints towards an Arduino binary; which uses an AVR microcontroller. A strin gin the binary hints towards an Arduino UNO, which has an ATmega328P microcontroller, specifically. I know quite a bit of AVR assembly,... ctf flareon4
October 17, 2017 Flare-on 2017 #8: flair.apk This is an Android APK, so first up, we need to decode it. Since an APK is just a zip, we could just unzip it, but that leaves quite a few encoded files inside; so using Apktool is a better... ctf flareon4