#IDA PRO SWITCH ANALYSIS FAILED PRO#
Tools : dnSpy, Process Monitor, IDA Pro + Windbg, dll_to_exe, FireFox & Chrome browser I recommend you run this next challenge in a VM or someone else’s computer you have gained access to, especially if they are a Firefox user. Reverse Engineering isn’t about toys and games. Since the filename of those png files are totally random, I decided to rename those files into something like 01_67782682.png manually and wrote another python script to extract the flag ( sounds stupid, but I was too lazy to think of a better way :P ) So according to the sample above we can know that the first character of the flag is “m”. The number at the top-left side of the picture indicates the n-th character of the flag. format ( output )) for _, _, files in os. Private string GetKey ( List revealedCells ) ". Later I’ve found an interesting function: I decompiled the binary with dnSpy and started inspecting the program logic. We’ll have to reveal all three None-Mine squares to win the game. The board is 30x30, and there’re 897 mines in the board. NET binary program, which is a minesweeper game. Beat it, win the championship, and we’ll move you on to greater challenges. You hacked your way into the Minesweeper Championship, good job. Since it’s the first challenge it’s quite easy : just use jd-gui to decompile the jar file, then we’ll see the correct code, which is also the flag: According to the description we have to reverse it and figure out the correct invitation code. You weren’t officially invited but if you can figure out what the code is you can probably get in anyway.
#IDA PRO SWITCH ANALYSIS FAILED REGISTRATION#
Welcome to the Fifth Annual Flare-On Challenge! The Minesweeper World Championship is coming soon and we found the registration app. You can also checkout the official solutions from FireEye.Įnough for the talk, let’s get started ! Level 1 Here in this post I’ll share my solution of each challenge – how I solve it, what tools did I use, …etc.
![ida pro switch analysis failed ida pro switch analysis failed](https://cdn.unlockboot.com/wp-content/uploads/2018/06/hd-sential-pro-1.jpg)
Last year I got stuck at level 12 and failed to finish the challenge, so I’m very glad that I was able to complete it this year ?.
![ida pro switch analysis failed ida pro switch analysis failed](https://www.proconexdirect.com/website/media/impact-partner/header/images/Proconex_EIP-2.png)
This year is the fifth annual of the CTF and has a total of 12 challenges, covering Windows PE (.NET, VC++, Delphi…), Linux ELF, Web Assembly, VM and other interesting stuffs.Īccording to the final result on, 129 out of 4925 players have finished the challenge this year. de-obfucating binary, malware analysis, …etc). The CTF contains lots of interesting, real-world style reversing challenges ( e.g. Flare-on challenge is a Reverse-style CTF challenge created by the FireEye FLARE team.