I once again participated in the Flare-On challenge organized by the FLARE team. This year, there was a total of 13 challenges to solve, which is more than previous years and the difficulty was significantly higher as well. Apart from classic Windows C/C++ executables, this year’s contest featured a Rust challenge, a Android application, a hard disk image compromised with a ransomware and even a PDP-11 challenge.
Like a hot knife through butter -- see how Binary Ninja sliced through binary obfuscations in #flareon10 competition: https://binary.ninja/2023/11/13/obfuscation-flare-on.html
As others have pointed out (https://twitter.com/vector35/status/1724285415677435909), BN users didn't even notice many of the obfuscation attempts!
Now that #flareon10 is over, want to see how Binary Ninja made several challenges far easier than with other tools? Check our Xusheng's latest blog about challenges 5 and 13!
As promised, here are my #BinaryRefinery solutions of #FlareOn10. Didn't quite refine them all, but there might be a nugget or two if you like static analysis:
https://github.com/binref/refinery/blob/master/tutorials/tbr-files.v0x08.flare.on.10.ipynb
Ah hell, learning about the existence of the #flareon10 reverse-engineering challenge was a mistake. Now I have no choice but to at least get on the leaderboard, even if it's in 2500th place...
Four weeks should be enough to get 1 point, right?