--- layout: default permalink: /flareon4/ title: 2017 Flare-On Challenge Walk Through --- [Go Back to All WorkShops](https://securedorg.github.io) # 2017 Flare-On Challenge Walk Through # Around September, FireEye hosts their annual [Flare-On](http://www.flare-on.com/) reverse engineering challenges. I wanted to make sure I participated this year since I would be coaching my intern at the same time. Between work and conference travel, I managed to finish on time. You can download the binaries [HERE](https://github.com/securedorg/securedorg.github.io/blob/master/flareon4/binaries.zip) ## Challenges ## ### Challenge 1) [login.html](https://securedorg.github.io/flareon4/challenge1) ### ### Challenge 2) [IgniteMe.exe](https://securedorg.github.io/flareon4/challenge2) ### ### Challenge 3) [greek_to_me.exe](https://securedorg.github.io/flareon4/challenge3) ### ### Challenge 4) [notepad.exe](https://securedorg.github.io/flareon4/challenge4) ### ### Challenge 5) [pewpewboat.exe](https://securedorg.github.io/flareon4/challenge5) ### ### Challenge 6) [payload.dll](https://securedorg.github.io/flareon4/challenge6) *pending* ### ### Challenge 7) [zsud.exe](https://securedorg.github.io/flareon4/challenge7) *pending* ### ### Challenge 8) [flair.apk](https://securedorg.github.io/flareon4/challenge8) *pending* ### ### Challenge 9) [remorse.ino.hex](https://securedorg.github.io/flareon4/challenge9) *pending* ### ### Challenge 10) [shell.php](https://securedorg.github.io/flareon4/challenge10) *pending* ### ### Challenge 11) [covfefe.exe](https://securedorg.github.io/flareon4/challenge11) *pending* ### ### Challenge 12) [missing](https://securedorg.github.io/flareon4/challenge12) *pending* ### ![alt text](https://securedorg.github.io/flareon4/images/flareonstats.png "flareon4stats")