This year proved to be the most difficult challenge they produced, with the lowest rate of finishers.
WARNING! Some of these challenges may be malicious. Exercise extreme caution when executing unknown code. Be safe and perform the analysis inside of a virtual machine.
With each challenge, you will find a Message.txt file that you must read to better understand what you need to do.
Supportive Resources:
- Practical Malware Analysis
- The Art of Memory Forensics
- The IDA Pro
- Practical Reverse Engineering
- x86 Instruction Set Architecture
Helpful Tools:
# | Question | Weight | Solved | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Challenge 1 – fidler.exe key? | 100 | 14 | ||||||||||||
2 | Challenge 2 – garbage.exe key? | 200 | 11 | ||||||||||||
3 | Challenge 3 – mydude.exe key? | 300 | 8 | ||||||||||||
4 | Challenge 4 – report.xls key? | 400 | 7 | ||||||||||||
5 | Challenge 5 – TKApp.tpk key? | 500 | 8 | ||||||||||||
6 | Challenge 6 – codeit.exe key? | 600 | 6 | ||||||||||||
7 | Challenge 7 – re_crowd.pcapng key? | 700 | 6 | ||||||||||||
8 | Challenge 8 – Aardvark key? | 800 | 6 | ||||||||||||
9 | Challenge 9 – crackinstaller.exe key? | 900 | 6 | ||||||||||||
10 | Challenge 10 – break key? | 1000 | 5 | ||||||||||||
11 | Challenge 11 – Rabbit Hole key? | 1100 | 5 | ||||||||||||