I really liked Flare11 aray challenge as a nice way to be solved with z3 - finally managed to record a video about that - https://youtu.be/kW8TyaBH5wI #flareon11 #ctfforbeginners #ctf
Intro to Z3 - Flare 11 - aray

YouTube

After #flareon11 challenge 7, I got inspired to build tooling for #dotnet Native AOT reverse engineering.

As such, I built a #Ghidra Analyzer that can automatically recover most .NET types, methods and frozen objects (e.g., strings).

👉https://blog.washi.dev/posts/recovering-nativeaot-metadata/

Recovering Metadata from .NET Native AOT Binaries

Ever seen a binary that looks like a .NET binary based on its strings, but .NET decompilers are not able to open them?

Washi

During #flareon11, I learned how to use a plugin to automate x64dbg with Python. In this video, I'll show how to set it up, get started, and then walk through my final tracing script.

https://www.youtube.com/watch?v=SkKaSn5JxAg

Automating x64dbg with x64dbgpython [Serpentine - Flare-On 2024]

YouTube

I just published my writeups for all challenges of #flareon11:

👉 https://blog.washi.dev/posts/flareon11/

👉 https://washi1337.github.io/ctf-writeups/writeups/flare-on/2024/

Hope you like them as much as I liked writing them!

Flare-On 11 Write-Ups

Today a short post.

Washi

Published my (entirely unpolished) solutions for Flare-on 11: https://github.com/msanft/flareon11

Solved 8/10 challenges, but considering that this is my first year playing it, I'm pretty satisfied. If I invested an amount of time I wouldn't have been able to justify with my sleep and work performance, I might even have solved it.

#flareon #flareon11 #re #reverseengineering

GitHub - msanft/flareon11: Flare-On 11

Flare-On 11. Contribute to msanft/flareon11 development by creating an account on GitHub.

GitHub
Few more scraps of code for #FlareOn11 this time c10 - #binja lifter and emulator for inner vm https://gist.github.com/mak/16d342594d26a9be8d0345c87d82bb3d
flare-on 2024 - c10

flare-on 2024 - c10. GitHub Gist: instantly share code, notes, and snippets.

Gist
I kinda enjoy this year #flareon11 learned a thing about ecc and spend way to much time writing deobfuscator for c9 here is the gist of it while writeup is in writing https://gist.github.com/mak/62cec665fa3339c4424317dedca004ee this should give a nice and clean disasm :)
gist:62cec665fa3339c4424317dedca004ee

GitHub Gist: instantly share code, notes, and snippets.

Gist

Had a lot of fun with #flareon11 this year! Managed to finish all 10 challenges, and get writeups done for all but two (maybe someday?). Check them out here:

https://0xdf.gitlab.io/flare-on-2024/

Redirecting…

I just made a big mistake and started participating in #flareon11 reversing challenge.
Finally finished #flareon11 🥲 Lost a lot of time AND SANITY on question 9. Learned a lot and had fun as always.