Instructions:
Unzip the challenge (pass: cyberdefenders.org), analyze samples and find the key. Each key looks like an email address and ends with @flare-on.com.
the FireEye Labs Advanced Reverse Engineering (FLARE) team created and released the FLARE On Challenge to the community. The purpose of the challenge is to hire smart individuals interested in reverse engineering in their security blue team. They have created this series of binary challenges to test reversing skills.
It’s not an alien space ship, it’s a huge belt buckle for this year’s winners (quarter for scale)! The challenge was a massive success, with 162 winners from a total of 1408 active participants. We consider active participants as those who solved one or more challenges. All the stats presented here are as of 12:00pm Eastern Time, which is 8 hours before the end of the contest.
The first challenge binary was downloaded by 4,850 people. The following graph depicts the number of finishers of each of the 11 stages this year.
WARNING! Some of these challenges may be malicious. Exercise extreme caution when executing unknown code. Be safe and perform the analysis inside of a virtual machine.
Supportive Resources:
Helpful Tools: