-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
add: Blog - Dear Diary, My flare-on 11
- Loading branch information
Showing
43 changed files
with
5,570 additions
and
10 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file not shown.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,89 @@ | ||
--- | ||
title: "Dear Diary, My Flare-On 11" | ||
date: 2024-11-08 | ||
draft: false | ||
summary: "My 2024 flare-on 11 journey" | ||
tags: ["reverse-engineering", "blog", "flare-on"] | ||
--- | ||
|
||
{{< lead >}} | ||
Every year, the flare-on offers reverse engineering enthusiasts a unique set of puzzles that push our skills and creativity to new limits. | ||
{{< /lead >}} | ||
|
||
This year it was no different. I’ll be writing down a short blog about my experience tackling this years challenges. | ||
|
||
## Timeline | ||
{{< timeline >}} | ||
|
||
{{< timelineItem icon="star" subheader="September 27th 2024 at 6:30 AM" >}} | ||
Starting of Flare-on | ||
{{< /timelineItem >}} | ||
|
||
{{< timelineItem subheader="September 27th, 5:09:55 PM" >}} | ||
Solved Challenge 1 - frog | ||
{{< /timelineItem >}} | ||
|
||
{{< timelineItem subheader="October 1st, 4:46:42 AM" >}} | ||
Solved Challenge 2 - checksum | ||
{{< /timelineItem >}} | ||
|
||
{{< timelineItem subheader="November 1st, 9:23:14 AM" >}} | ||
Solved Challenge 3 - aray | ||
{{< /timelineItem >}} | ||
|
||
{{< timelineItem subheader="November 6th, 6:07:38 AM" >}} | ||
Solved Challenge 4 - Meme Maker 3000 | ||
{{< /timelineItem >}} | ||
|
||
{{< timelineItem icon="heart-empty" subheader="November 8th 2024 at 8pm" >}} | ||
Ending of Flare-on | ||
{{< /timelineItem >}} | ||
|
||
{{< /timeline >}} | ||
|
||
## Challenge 1 - frog | ||
|
||
<img src="img/frog.png"> | ||
|
||
We were given a game written in python using the pygames library. | ||
|
||
<img src="img/frog-game.png"> | ||
|
||
The logic of the game and the encryption was simple to understand and didn't take me much to get the flag. | ||
|
||
## Challenge 2 - checksum | ||
|
||
<img src="img/checksum.png"> | ||
|
||
For me this was the most chellenging one out of all the challenges I solved. | ||
We had to reverse an executable written in [Go](https://go.dev/). | ||
|
||
The first step was to reverse engineer the hash used to solve the checksum, and the second step involved | ||
finding the path where the flag image was generated. | ||
|
||
## Challenge 3 - aray | ||
|
||
<img src="img/aray.png"> | ||
|
||
We had to deal with [yara](https://virustotal.github.io/yara/) rule constraints into solving the challenge through patience and scripting. At the end of solving, my script turned out to be of 407 lines. | ||
|
||
## Challenge 4 - Meme Maker 3000 | ||
|
||
<img src="img/meme.png"> | ||
|
||
Last of the challenge that I managed to solve was Meme Maker 300 which was a Javascript Obfuscattion challenge. | ||
|
||
I quickly deobfuscated and clened up the code as I began to understand the logic. After playing with the browser counsole | ||
couple to times, I managed to understand the logic for the required conditions and got the flag. | ||
|
||
## Goodbye | ||
|
||
That wraps up my journey, having solved 4 out of 10 challenges. | ||
|
||
I might have solved more if I had been consistent but I’m happy with my performance this year improving over my last years results. Along the way, I got the chance to learn and explore new techniques growing as a reverse engineer. | ||
|
||
So, this is a seeya and not a goodbye. Will come back stronger and better next year. | ||
|
||
:) | ||
|
||
<img src="img/glgs.webp"> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.