βͺ
CTFs
TwitterGithub
  • πŸ‘‹Introduction
  • πŸ“šWrite Up
    • 2024
      • πŸ“–1337UP LIVE CTF
        • Reverse Engineering
        • Mobile
        • Forensic
        • Misc
      • πŸ“–HKCERT CTF Quals
        • Reverse Engineering
        • Binary Exploitation
      • πŸ“–Flare-On 11
        • Challenge #1 - frog
      • πŸ“–Intechfest
        • Reverse Engineering
        • Forensic
        • Cryptography
        • Mobile
      • πŸ“–Cyber Breaker Competition (1v1)
        • Reverse Engineering
        • Web Exploitation
        • Cryptography
        • Binary Exploitation
      • πŸ“–Cyber Breaker Competition Quals
        • Reverse Engineering
        • Web Exploitation
        • Cryptography
      • πŸ“–BlackHat MEA Quals
        • Reverse Engineering
        • Forensic
      • πŸ“–TFC CTF
        • Reverse Engineering
        • Forensic
        • Misc
      • πŸ“–DeadSec CTF
        • Reverse Engineering
        • Web Exploitation
      • πŸ“–Aptos - Code Collision CTF
        • Reverse Engineering
        • Misc
      • πŸ“–DownUnder CTF
        • Reverse Engineering
      • πŸ“–JustCTF
        • Reverse Engineering
        • Forensic
        • Misc
      • πŸ“–Akasec CTF
        • Reverse Engineering
        • Forensic
      • πŸ“–Codegate CTF Preliminary
        • Reverse Engineering
      • πŸ“–NahamCon CTF
        • Cryptography
        • Reverse Engineering
        • Malware
        • Misc
        • Mobile
        • Scripting
        • Web Exploitation
        • Forensic
      • πŸ“–SAS CTF Quals
        • Reverse Engineering
      • πŸ“–SwampCTF
        • Reverse Engineering
        • Misc
        • Cryptography
      • πŸ“–UNbreakable International
        • Reverse Engineering
        • Network
        • Cryptography
      • πŸ“–ACSC
        • Reverse Engineering
        • Hardware
        • Web Exploitation
      • πŸ“–0xL4ugh
        • Mobile
    • 2023
      • πŸ“–BlackHat MEA Final
        • Reverse Engineering
        • Web Exploitation
      • πŸ“–Flare-On 10
        • Challenge #1 - X
        • Challenge #2 - ItsOnFire
        • Challenge #3 - mypassion
        • Challenge #4 - aimbot
        • Challenge #5 - where_am_i
        • Challenge #6 - FlareSay
        • Challenge #7 - flake
        • Challenge #8 - AmongRust
        • Challenge #9 - mbransom
        • Challenge #10 - kupo
        • Challenge #11 - over_the_rainbow
        • Challenge #12 - HVM
        • Challenge #13 - y0da
      • πŸ“–LakeCTF Quals
        • Reverse Engineering
        • Cryptography
      • πŸ“–TSG CTF
        • Reverse Engineering
        • Cryptography
      • πŸ“–ISITDTU Quals
        • Web Exploitation
        • Misc
        • Reverse Engineering
      • πŸ“–BlackHat MEA Quals
        • Reverse Engineering
      • πŸ“–ASCIS Final
        • Reverse Engineering
        • Web Exploitation
        • Cryptography
      • πŸ“–ASCIS Quals
        • Reverse Engineering
        • Forensic
        • Cryptography
      • πŸ“–IFest
        • Reverse Engineering
        • Cryptography
        • Misc
      • πŸ“–Cyber Jawara International
        • Reverse Engineering
        • Forensic
        • Cryptography
        • Web Exploitation
      • πŸ“–Intechfest
        • Reverse Engineering
        • Forensic
        • Cryptography
        • Mobile
      • πŸ“–CSAW Quals
        • Reverse Engineering
      • πŸ“–SECCON Quals
        • Reverse Engineering
      • πŸ“–CTFZone Quals
        • Reverse Engineering
      • πŸ“–Securinets Quals
        • Reverse Engineering
      • πŸ“–Compfest Final (Attack Defense)
        • Web Exploitation
        • Cryptography
      • πŸ“–Compfest Quals
        • Reverse Engineering
        • Cryptography
        • Forensic
        • Misc
      • πŸ“–Tenable
        • Reverse Engineering
        • Cryptography
        • Steganography
      • πŸ“–ASCWG Quals
        • Reverse Engineering
        • Cryptography
      • πŸ“–Gemastik Quals
        • Reverse Engineering
      • πŸ“–BSides Indore
        • Reverse Engineering
        • Cryptography
      • πŸ“–NahamCon CTF
        • Cryptography
      • πŸ“–HSCTF
        • Reverse Engineering
        • Cryptography
        • Web Exploitation
        • Misc
      • πŸ“–ACSC
        • Reverse Engineering
      • πŸ“–HackTM Quals
        • Reverse Engineering
    • 2022
      • πŸ“–Intechfest
        • Reverse Engineering
        • Mobile
        • Cryptography
      • πŸ“–NCW Final
        • Reverse Engineering
      • πŸ“–NCW Quals
        • Reverse Engineering
        • Misc
        • Cryptography
      • πŸ“–Compfest Final
        • Reverse Engineering
        • Forensic
      • πŸ“–Compfest Quals
        • Reverse Engineering
        • Cryptography
      • πŸ“–IFest
        • Reverse Engineering
        • Cryptography
        • Forensic
    • 2021
      • πŸ“–Cyber Jawara Final
        • Reverse Engineering
      • πŸ“–Cyber Jawara Quals
        • Reverse Engineering
        • Cryptography
      • πŸ“–DarkCon CTF
        • Reverse Engineering
      • πŸ“–Wreck IT Quals
        • Mobile
      • πŸ“–MDT4.0 Final
        • Reverse Engineering
        • Cryptography
        • Forensic
      • πŸ“–MDT4.0 Quals
        • Reverse Engineering
        • Cryptography
      • πŸ“–IFest
        • Reverse Engineering
        • Cryptography
      • πŸ“–Compfest Final
        • Reverse Engineering
      • πŸ“–Compfest Quals
        • Reverse Engineering
        • Cryptography
    • 2020
      • πŸ“–Deep CTF
        • Reverse Engineering
  • 🚩Lifetime CTF
    • πŸ“–Hack The Box
      • Reverse Engineering
        • TBU
Powered by GitBook
On this page
  • Description
  • Solution
  1. Write Up
  2. 2023
  3. Flare-On 10

Challenge #1 - X

PreviousFlare-On 10NextChallenge #2 - ItsOnFire

Last updated 9 months ago

Description

Welcome to the 10th Annual Flare-On Challenge!

Statistically, you probably won’t finish every challenge. Every journey toward excellence starts somewhere though, and yours starts here. Maybe it ends here too.

This package contains many files and, I can’t believe i’m saying this, click the one with the β€œ.exe” file extension to launch the program. Maybe focus your β€œreverse engineering” efforts on that one too.

Solution

Since the pin only 2 digits, i bruteforce it manually.

By executing the program we know that the flag will be shown if we input valid 2 digits and click the "lock" button. Based on the function structure name, the function lockButton_Click will be the called function when we click the "lock" button. So by looking at decompiler result we can get the flag directly in plaintext.

Flag : glorified_captcha@flare-on.com

Another solution is by decompiling the program using dnspy. At the time of competition i used old version of which didn't produce the actual code. But after competition i notice that there is a new version of that maintained by another user. Download the latest version from the repository and then decompile the X.dll.

πŸ“š
πŸ“–
dnspy
dnspy
old version of dnspy
new version of dnspy