/flareon9-writeups

Writeups for FlareON-9 (2022)

Primary LanguageJavaScript

FlareOn-9 Write-ups

This repo contains scripts/programs that I developed during the FLAREON-9.

Many thanks to the FLARE team. It was an interesting journey and I liked it a lot :D

Read original write-ups here: flareon9-writeups.

Challenges

1. ๐Ÿ—ฟ flaredle

You probably won't win. Maybe you're like us and spent the year playing Wordle. 
We made our own version that is too hard to beat without cheating.

TLDR: The hardest challenge ever.... No way you could solve it with strings.

Writeup link: ๐Ÿ—ฟ flaredle

2. ๐Ÿ”ณ pixelpoker

I said you wouldn't win that last one. I lied. The last challenge was basically a captcha.
Now the real work begins. Shall we play another game?

TLDR: You can decrypt one pixel at a time, but if you find a particular pixel, the whole image will be decrypted.

Writeup link: ๐Ÿ”ณ pixelpoker

3. ๐ŸŽฑ magic8ball

You got a question? Ask the 8 ball!

TLDR: Find the magic phrase and shake the ball in the right order.

Writeup link: ๐ŸŽฑ magic8ball

4. ๐Ÿ”™ darn_mice

"If it crashes its user error." -Flare Team

TLDR: RET, RET, RET, ...

Writeup link: ๐Ÿ”™ darn_mice

Files list:

  • bruteforce.py - Finds "correct" argument value using byte-by-byte bruteforce
  • solve.py - Finds correct argument value

5. ๐Ÿ”Ž t8

FLARE FACT #823: Studies show that C++ Reversers have fewer friends on average than normal people do. 
That's why you're here, reversing this, instead of with them, because they don't exist.

Weโ€™ve found an unknown executable on one of our hosts. The file has been there for a while, 
but our networking logs only show suspicious traffic on one day. Can you tell us what happened?

TLDR: Reverse it all the way to the end. And either find a random seed or spoof a hash value to decrypt the flag.

Writeup link: ๐Ÿ”Ž t8

Files list:

6. ๐Ÿงช alamode

FLARE FACT #824: Disregard flare fact #823 if you are a .NET Reverser too.

We will now reward your fantastic effort with a small binary challenge. You've earned it kid!

TLDR: Open it in IDA as a PE and not as a .NET file. Find the RC4 key and decrypt the flag. Profit!

Writeup link: ๐Ÿงช alamode

Files list:

7. ๐Ÿ›ธ anode

You've made it so far! I can't believe it! And so many people are ahead of you!

TLDR: Just, ... just do it! Seriously. Iteratively find all corner cases, deobfuscate further and further, and you will get clean flag constraints. In the end, I used bitwuzla-powered DSE to find the flag.

Writeup link: ๐Ÿ›ธ anode

Files list:

8. ๐Ÿ’€ backdoor

I'm such a backdoor, decompile me why don't you...

TLDR: That was a HELL! The most time-consuming challenge for me. I've spent 30+ hours on it (mostly because of some silly mistakes that hindered my progress). But the idea behind is straightforward - write a deobfuscator :D The next step is to reverse the code and find a way to generate the correct key.

Writeup link: ๐Ÿ’€ backdoor

Files list:

9. ๐Ÿ— encryptor

You're really crushing it to get this far. This is probably the end for you. Better luck next year!

TLDR: This is an RSA challenge. However, the flag was encrypted using a private exponent, and you're given a public one. So you can simply decrypt the flag using the public exponent. That's how RSA works.

Writeup link: ๐Ÿ— encryptor

Files list:

10. ๐Ÿ’ป Nur_getraumt

This challenge is a Macintosh disk image (Disk Copy 4.2 format, for those who need to know) containing a 68K Macintosh program. 
You must determine the passphrase used to decode the flag contained within the application. 
Super ResEdit, an augmented version of Apple's ResEdit resource editor which adds a disassembler, is also included on the disk image to help you complete the challenge, though you will likely also need to do some outside research to guess the passphrase. 
This application can be run on any Macintosh emulator (or any real Macintosh from as far back as a Mac Plus running System 6.0.x up to a G5 running Classic). 
The setup of the emulation environment is part of the challenge, so few spoilers live here, but if you want to save yourself some headaches, Mini vMac is a pretty good choice that doesn't take much effort to get up and running compared to some other options. 
This application was written on a Power Macintosh 7300 using CodeWarrior Pro 5, ResEdit, and Resourcerer (my old setup from roughly 1997, still alive!). 
It was tested on a great many machines and emulators, and validated to run well on Mac OS from 6.0.8 through 10.4. Happy solving! Be curious!

TLDR: Install the mini vMac and run the program. And either you are smart enough to try the first line of 99 Luftballons lyrics (in Deutsche!) or not (like me). In the second case, just sit around for a while, get an idea of how the check is done (it's a simple XOR), and try a known plaintext attack ("@flare-on.com"). Get part of the song lyrics, go to Google once again and find the rest of the lyrics. And you're all set.

Writeup link: ๐Ÿ’ป Nur_getraumt

Files list:

  • crack.py - Performs a known plaintext attack

11. ๐Ÿ“– XXX

Protection, Obfuscation, Restrictions... Oh my!!

The good part about this one is that if you fail to solve it I don't need to ship you a prize.

TLDR: Open it in API Monitor, and find out that it tries to connect to "http[:]//evil[.]flare-on.com/". Add an entry to the hosts file. Rerun the program. Observe a request to the localhost. Find out that it is encrypted in some way. Try guessing. Maybe it's xor? Add breakpoints to python's xor functions. Find out that the number of XOR calls exactly matches the number of bytes in the flag. Use FRIDA to hook xor function and dump the flag. Profit!

Writeup link: ๐Ÿ“– XXX

Files list: