Unzip the challenge (pass: cyberdefenders.org), analyze samples and find the key. Each key looks like an email address and ends with @flare-on.com.
The first challenge is a self-extracting zip file that requires you to accept the EULA before continuing.
In July, the FireEye Labs Advanced Reverse Engineering (FLARE) team created and released the first FLARE On Challenge to the community. The purpose of the challenge is to hire smart individuals interested in reverse engineering in their security blue team. They have created this series of binary challenges to test reversing skills.
A total of 7,140 people participated and showed off their skills, and 226 people completed the challenge. Everyone who finished the challenge received a challenge coin to commemorate their success.
WARNING! Some of these challenges may be malicious. Exercise extreme caution when executing unknown code. Be safe and perform the analysis inside of a virtual machine.
Given the sheer volume of email requests, our team might take longer to get back to you. Want a quick answer? Post in our community where our team & members respond promptly!