--- layout: default permalink: /flareon4/ title: 2017 Flare-On Challenge Walk Through --- [Go Back to All WorkShops](https://securedorg.github.io) # 2017 Flare-On Challenge Walk Through # Around September, FireEye hosts their annual [Flare-On](http://www.flare-on.com/) reverse engineering challenges. I wanted to make sure I participated this year since I would be coaching my intern at the same time. Between work and conference travel, I managed to finish on time. ## Challenges ## ### Challenge 1) [login.html](#) ### ### Challenge 2) [IgniteMe.exe](#) ### ### Challenge 3) [greek_to_me.exe](#) ### ### Challenge 4) [notepad.exe](#) ### ### Challenge 5) [pewpewboat.exe](#) ### ### Challenge 6) [payload.dll](#) ### ### Challenge 7) [zsud.exe](#) ### ### Challenge 8) [flair.apk](#) ### ### Challenge 9) [remorse.ino.hex](#) ### ### Challenge 10) [shell.php](#) ### ### Challenge 11) [covfefe.exe](#) ### ### Challenge 12) [missing](#) ### ![alt text](https://securedorg.github.io/flareon4/images/flareonstats.png "flareon4stats")