Challenge #1 - X
Last updated
Last updated
Welcome to the 10th Annual Flare-On Challenge!
Statistically, you probably wonβt finish every challenge. Every journey toward excellence starts somewhere though, and yours starts here. Maybe it ends here too.
This package contains many files and, I canβt believe iβm saying this, click the one with the β.exeβ file extension to launch the program. Maybe focus your βreverse engineeringβ efforts on that one too.
Since the pin only 2 digits, i bruteforce it manually.
Another solution is by decompiling the program using dnspy. At the time of competition i used old version of dnspy which didn't produce the actual code. But after competition i notice that there is a new version of dnspy that maintained by another user. Download the latest version from the repository and then decompile the X.dll.
By executing the program we know that the flag will be shown if we input valid 2 digits and click the "lock" button. Based on the function structure name, the function lockButton_Click will be the called function when we click the "lock" button. So by looking at decompiler result we can get the flag directly in plaintext.
Flag : glorified_captcha@flare-on.com