After #flareon11 challenge 7, I got inspired to build tooling for #dotnet Native AOT reverse engineering.
As such, I built a #Ghidra Analyzer that can automatically recover most .NET types, methods and frozen objects (e.g., strings).
👉https://blog.washi.dev/posts/recovering-nativeaot-metadata/
During #flareon11, I learned how to use a plugin to automate x64dbg with Python. In this video, I'll show how to set it up, get started, and then walk through my final tracing script.
I just published my writeups for all challenges of #flareon11:
👉 https://blog.washi.dev/posts/flareon11/
👉 https://washi1337.github.io/ctf-writeups/writeups/flare-on/2024/
Hope you like them as much as I liked writing them!
Published my (entirely unpolished) solutions for Flare-on 11: https://github.com/msanft/flareon11
Solved 8/10 challenges, but considering that this is my first year playing it, I'm pretty satisfied. If I invested an amount of time I wouldn't have been able to justify with my sleep and work performance, I might even have solved it.
Had a lot of fun with #flareon11 this year! Managed to finish all 10 challenges, and get writeups done for all but two (maybe someday?). Check them out here: