mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2026-01-06 07:44:23 +01:00
42 lines
1.0 KiB
Markdown
42 lines
1.0 KiB
Markdown
---
|
|
layout: default
|
|
permalink: /flareon4/
|
|
title: 2017 Flare-On Challenge Walk Through
|
|
---
|
|
[Go Back to All WorkShops](https://securedorg.github.io)
|
|
|
|
# 2017 Flare-On Challenge Walk Through #
|
|
|
|
Around September, FireEye hosts their annual [Flare-On](http://www.flare-on.com/) reverse engineering challenges.
|
|
|
|
I wanted to make sure I participated this year since I would be coaching my intern at the same time. Between work and conference travel, I managed to finish on time.
|
|
|
|
## Challenges ##
|
|
|
|
### Challenge 1) [login.html](#) ###
|
|
|
|
### Challenge 2) [IgniteMe.exe](#) ###
|
|
|
|
### Challenge 3) [greek_to_me.exe](#) ###
|
|
|
|
### Challenge 4) [notepad.exe](#) ###
|
|
|
|
### Challenge 5) [pewpewboat.exe](#) ###
|
|
|
|
### Challenge 6) [payload.dll](#) ###
|
|
|
|
### Challenge 7) [zsud.exe](#) ###
|
|
|
|
### Challenge 8) [flair.apk](#) ###
|
|
|
|
### Challenge 9) [remorse.ino.hex](#) ###
|
|
|
|
### Challenge 10) [shell.php](#) ###
|
|
|
|
### Challenge 11) [covfefe.exe](#) ###
|
|
|
|
### Challenge 12) [missing](#) ###
|
|
|
|
|
|
|
|
 |