Eviatar Gerzi

This year I participated in Flare-On 8 (2021) and I wanted to share my thoughts about this great CTF. Unfortunately, I didn’t have time to continue and I solved only three challenges. Maybe in the future I will solve more but this is what I have now, so be aware that this write-up is far from being complete but I hope it would help for those who tried the first challenges.

Solutions

I separated my solutions into different pages to make it more readable:

  1. Challenge #1 — credchecker
  2. Challenge #2 — known
  3. Challenge #3 — antioch
  4. Challenge #4 — ?
  5. Challenge #5 — ?
  6. Challenge #6 —?
  7. Challenge #7 — ?
  8. Challenge #8 — ?
  9. Challenge #9 — ?
  10. Challenge #10 — ?

--

--

We received a packed TPK file that we can just unpack with 7zip. Inside the “bin” folder we had number of interesting DLLs, the one that was the most interesting was the “TKApp.dll”, so we analyzed it with dnSpy.

--

--

Eviatar Gerzi

Eviatar Gerzi

Security researcher interested in reversing, solving CTFs, malware analysis, penetration testing and DevOps security (docker and Kubernetes)