RE-Dojo https://re-dojo.github.io/ Recent content on RE-Dojo Hugo -- gohugo.io en Sun, 19 Nov 2023 00:00:00 +0000 Flare-On 10 solutions https://re-dojo.github.io/posts/flareon10/ Sun, 19 Nov 2023 00:00:00 +0000 https://re-dojo.github.io/posts/flareon10/ <p>I once again participated in the <a class="gblog-markdown__link" href="https://flare-on10.ctfd.io/" >Flare-On</a> challenge organized by the FLARE team.</p> <p>This year, there was a total of 13 challenges to solve, which is more than previous years and the difficulty was significantly higher as well. Apart from classic Windows C/C++ executables, this year&rsquo;s contest featured a Rust challenge, a Android application, a hard disk image compromised with a ransomware and even a <a class="gblog-markdown__link" href="https://en.wikipedia.org/wiki/PDP-11" >PDP-11</a> challenge.</p> Flare-On 9 solutions https://re-dojo.github.io/posts/flareon9/ Sun, 13 Nov 2022 00:00:00 +0000 https://re-dojo.github.io/posts/flareon9/ <p>This year, I participated in the <a class="gblog-markdown__link" href="https://flare-on9.ctfd.io/" >Flare-On</a> challenge organized by the FLARE team from <del>Mandiant</del> Google.</p> <p>In total, 11 challenges of reverse engineering with increasing difficulty were to be solved. I did managed to resolve them all and as there was not a lot of activity on this blog recently, I pushed myself to put together some write-ups.</p> FCSC 2020 - Keykoolol https://re-dojo.github.io/posts/fcsc2020/keykoolol/ Sat, 09 May 2020 00:00:00 +0000 https://re-dojo.github.io/posts/fcsc2020/keykoolol/ <p>A few weeks ago, I participated in the France CyberSecurity Challenge (or <a class="gblog-markdown__link" href="https://france-cybersecurity-challenge.fr/" >FCSC</a> in short); a Jeopardy CTF organized by the National Cybersecurity Agency of France (<a class="gblog-markdown__link" href="https://www.ssi.gouv.fr/en/" >ANSSI</a>) to select the french team that will participate to the European Cybersecurity Challenge (ECSC) at the end of 2020.</p> <p>Among the challenges proposed (crypto, reverse, pwn, web, forensic, hardware), I really liked doing one of the reverse track named <strong>keykoolol</strong>.</p> NorthSec 2019 - Doom https://re-dojo.github.io/posts/nsec2019/doom/ Wed, 22 May 2019 00:00:00 +0000 https://re-dojo.github.io/posts/nsec2019/doom/ <p>We, once again, participated in the NorthSec competition. This article is about the DOOM challenge which was pretty interesting as you had to validate it at the VR station. @actgardner already made a write-up that you can find <a class="gblog-markdown__link" href="http://www.agardner.me/securit/ctf/northsec/2019/2019/05/19/northsec-ctf-part-1-doom.html" >here</a>. I wanted to complete it and show another solution that icecr4ck and I came up with.</p> NorthSec 2018 - Mars Analytica https://re-dojo.github.io/posts/nsec2018/mars_analytica/ Sun, 28 Oct 2018 00:00:00 +0000 https://re-dojo.github.io/posts/nsec2018/mars_analytica/ In May 2018, the NorthSec conference and its on-site CTF competition were held. Once again the competition was awesome, the challenges were very diverse and the infrastructure was well configured. One of the reverse engineering challenges was a program called MarsAnalytica. This challenge remained unsolved at the end of the CTF. This binary was worth a lot of points and I think it was the right amount of points due to the time one would have to spend to solve it. ECW 2017 - Red Diamond https://re-dojo.github.io/posts/ecw2017/red_diamond/ Fri, 28 Sep 2018 00:00:00 +0000 https://re-dojo.github.io/posts/ecw2017/red_diamond/ <p>Pour la deuxième année consécutive, Thales et Airbus ont organisé un CTF à destination des étudiants européens: le <a class="gblog-markdown__link" href="https://challenge-ecw.fr/" >challenge ECW</a>. Tout comme l&rsquo;année dernière, celui-ci est séparé en une épreuve qualificative individuelle (CTF Jeopardy classique) et une phase finale par équipe avec un format Attaque/Défense.</p>