Flare-On 5 CTF | Joachim De Zutter
In 2018, I solved 11 out of 12 challenges of the flare-on reverse engineering CTF so my nickname ("jdz") ended in the honorable mention section at http://www.flare-on.com/2018.html.

I gave a 5 minute lightning talk about this CTF at OpenFest 2018. Aparently I switched the 8th and 9th challenge... (pptx, pptx on GitHub)



7zip password: infected
1 MinesweeperChampionshipRegistration.7z
2 UltimateMinesweeper.7z
3 FLEGGO.7z
4 binstall.7z
5 web2point0.7z
6 magic.7z
7 WorldOfWarcraft.7z
8 doogie.7z
9 leet_editr.7z
10 golf.7z
11 malware_skillz.7z
12 suspicious_floppy.7z
Flare-On5_Challenges.zip

https://www.fireeye.com/blog/threat-research/2018/10/2018-flare-on-challenge-solutions.html

To solve the magic mushroom challenge I wrote a GDB script:
#!/usr/bin/bash
rm -f file.txt
a=0
while [[ $a -lt 666 ]]
do
	echo "?????????????????????????????????????????????????????????????????????">>file.txt
	((a=a+1))
done
cat file.txt | gdb ./magic -x magic.gdbscript.txt 2>/dev/null
rm -f file.txt