In this workshop we will be solving the challenges from The Flare On Challenge 2016 by FireEye's Advanced Reverse Engineering team.
- Be able to understand simple x86 ASM instructions or be able to learn on the go.
- Windows 7 64-bit with .NET framework 4.5 and Visual Studio installed (Preferred, not sure if others would have weird behaviors)
- Ubuntu 16.04 with gccgo5 installed (Preferred, you can also install other versions of ubuntu with gccgo5)
- Wireshark
- Python (2.7 preferred)
- IDA (You can download demo from https://www.hex-rays.com/products/ida/support/download_demo.shtml)
- Node.js
1 - challenge1.exe
2 - DudeLocker.exe
3 - unknown
6 - khaki.exe
7 - hashes
9 - GUI.exe
10 - flava.pcap
FireEye for the challenges provided from the Flare On Challenge 2016.
Jacob Soo for providing some of the tools.
Materials provided here should not be used for commercial purpose. I do not claim credit for the challenges used in this workshop and the copyright belongs to the individual authors/FireEye.