Added to the collection 🥰 #flareon10
Wrote some solutions for #flareon10 at https://re-dojo.github.io/posts/flareon10/ Awesome challenges this year, thanks to the authors for the hard work!
Flare-On 10 solutions

I once again participated in the Flare-On challenge organized by the FLARE team. This year, there was a total of 13 challenges to solve, which is more than previous years and the difficulty was significantly higher as well. Apart from classic Windows C/C++ executables, this year’s contest featured a Rust challenge, a Android application, a hard disk image compromised with a ransomware and even a PDP-11 challenge.

RE-Dojo

Like a hot knife through butter -- see how Binary Ninja sliced through binary obfuscations in #flareon10 competition: https://binary.ninja/2023/11/13/obfuscation-flare-on.html

As others have pointed out (https://twitter.com/vector35/status/1724285415677435909), BN users didn't even notice many of the obfuscation attempts!

Binary Ninja - Analyzing Obfuscated Code With Binary Ninja -- a Flare-On Journey

Binary Ninja is a modern reverse engineering platform with a scriptable and extensible decompiler.

Binary Ninja

Now that #flareon10 is over, want to see how Binary Ninja made several challenges far easier than with other tools? Check our Xusheng's latest blog about challenges 5 and 13!

https://binary.ninja/2023/11/13/obfuscation-flare-on.html

Binary Ninja - Analyzing Obfuscated Code With Binary Ninja -- a Flare-On Journey

Binary Ninja is a modern reverse engineering platform with a scriptable and extensible decompiler.

Binary Ninja
Ups forgot about this one:)
Since everyone is flexing with their #flareon10 chal13 deobfuscators - here is my https://lokalhost.pl/dump/f2023_13_deob.py - pipe it to nasm and you’ll have a nice new binary ready to be analyzed ;)

As promised, here are my #BinaryRefinery solutions of #FlareOn10. Didn't quite refine them all, but there might be a nugget or two if you like static analysis:

https://github.com/binref/refinery/blob/master/tutorials/tbr-files.v0x08.flare.on.10.ipynb

refinery/tutorials/tbr-files.v0x08.flare.on.10.ipynb at master · binref/refinery

High Octane Triage Analysis. Contribute to binref/refinery development by creating an account on GitHub.

GitHub
Now that #flareon10 ended, I pushed my notes & write-ups to https://github.com/jk45054/CTF-writeups/tree/main/Flare-On%2010
Detailed walkthroughs for 7, 10, 12 and 13. Also some raw-ish notes and python solve scripts for all others. It's been great fun - and only 10,5 months to FlareOn 11!
Thanks
@nickharbour
& team
CTF-writeups/Flare-On 10 at main · jk45054/CTF-writeups

Writeups for CTF challenges. Contribute to jk45054/CTF-writeups development by creating an account on GitHub.

GitHub
Finished #flareon10 in 69th place this year. 🎉🎉 It was definitely the hardest year. I had so much fun and agony at the same time. Next year's goal is to top 30.
During #FlareOn10, I got some positive feedback about my retro themed #Ghidra. It's a slight modification of the built-in Ghidra dark theme with higher contrast colors. I put it on GitHub and added my IDA-like key bindings on top because this way I have my entire Ghidra config in one place. If you're reading this, you probably either hate Ghidra or you find this useful.
https://github.com/huettenhain/ghidradark
GitHub - huettenhain/ghidradark: How to retro theme your Ghidra

How to retro theme your Ghidra. Contribute to huettenhain/ghidradark development by creating an account on GitHub.

GitHub

Ah hell, learning about the existence of the #flareon10 reverse-engineering challenge was a mistake. Now I have no choice but to at least get on the leaderboard, even if it's in 2500th place...

Four weeks should be enough to get 1 point, right?