🔐Blog of Osanda

Security Researching and Reverse Engineering

Skip to content
  • 🏠 Home
  • 🔒 My Advisories
  • 💊 Cool Posts
    • 💉 SQLi
    • 🕷 Web App Security
    • 🛠 Tools
    • ☢ Exploits
    • 🔬 Reverse Engineering
    • 🧬 Malware Analysis
  • ☠ Shellcodes
  • ☣ About

challenges

  • Osanda Malith Jayathissa
  • February 3, 2016

2014 Flare On Challenge 1

You can download the challenge from here: http://www.flare-on.com/files/C1.exe

As we run the application we get this.

View post on imgur.com

When we click on decode the we get this encrypted string.

View post on imgur.com


(more…)

Share this:

  • Tweet
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to print (Opens in new window) Print
  • More
  • Click to share on Reddit (Opens in new window) Reddit
  • Share on Tumblr
  • Pocket
Reversing
challenges, Flare on, Reverse Engineering

Search

Archives

Categories

Join 4,752 other subscribers
Buy Me A Coffee

TRANSLATE

Tweets by OsandaMalith

Tags

0day ARM assembly blogging C c/c++ Certs crackme CSRF ctf DLL Hijacking DoS egg hunting eLearnSecurity exploit exploit development HEVD kernel LFI Microsoft mimikatz MS-DOS MSN MySQL PE Pentesting PHP POST XSS Programming Reverse Engineering reversing SecurityNet.org security researchers shellcode special thanks SQLi SQL injection technology tools vulnerable version Web Application Security windows WMI XSS ZTE
  • Home
  • ☠ Shellcodes
  • ☣ About
  • 💊 Cool Posts
  • 🔒 My Advisories

Copyright © 2025 Osanda Malith Jayathissa