Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Mobile Security

Flare-On 6 CTF WriteUp (Part 5)

Cyberinchief by Cyberinchief
November 18, 2025
Reading Time: 5 mins read
0
Flare-On 6 CTF WriteUp (Part 5)


RELATED POSTS

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026

Emerging Technology Management for Modern IT Leaders

Adopting Blueprints in Jamf Tools

This is the fifth part of the Flare-On 6 CTF WriteUp series.

5 – Demo

The challenge reads

Someone on the Flare team tried to impress us with their demoscene skills. It seems blank. See if you can figure it out or maybe we will have to fire them. No pressure.
** You will need DirectX 9

We have a PE file named 4k.exe. Running the binary pops up a window containing the rotating Flare logo on a black background.

Figure 1: Rotating Flare logo
Figure 1: Rotating Flare logo

The window doesn’t exhibit any other behavior. It does not respond to mouse clicks or keypresses except the ESC key which closes it.

An entropy scan in Detect It Easy reveals the binary is packed.

Figure 2: The binary is packed
Figure 2: The binary is packed

The instructions near the entrypoint does not look to be generated by a standard compiler which confirms that the binary is indeed packed.

Buy JNews
ADVERTISEMENT
Figure 3: This does not look to be generated by a standard compiler
Figure 3: This does not look to be generated by a standard compiler

Dynamic analysis in a debugger is generally the best way when reversing packed binaries. Packed binaries have a decompression stub at the beginning whose purpose is to decompress the compressed code to a proper location in memory and transfer control to it. Analyzing the decompression stub is not always needed. Likewise, in this binary we can can bypass the decompression stub. Set a breakpoint on the ret instruction as shown in Figure 4. Its located a few lines below the entrypoint.

Figure 4: Bypassing the decompression stub
Figure 4: Bypassing the decompression stub

When the breakpoint hits, single step once to reach Figure 5 which is close to the Original Entry Point (OEP)

Figure 6: Near OEP
Figure 6: Near OEP

The OEP is located just below at 42008E as shown in Figure 7.

Figure 7: At OEP
Figure 7: At OEP

As mentioned in the challenge description, the binary requires DirectX 9 to run. To ease analysis, its recommended to have the proper pdb symbols loaded. First ensure that Symbol Store and Symbol path are set in x64dbg preference. Now go to the symbols tab, Right Click -> Download Symbols for all modules.

At the beginning we  have a call to Direct3DCreate9.

Figure 8: Call to Direct3DCreate9
Figure 8: Call to Direct3DCreate9

If the call is successful, it proceeds to create a window and set its size as in Figure 9.

Figure 9: Creating a window
Figure 9: Creating a window

Next down, we have a call to a function which creates two meshes. A mesh is an ordered collection of vertices describing an object.

Figure 10: Creating two meshes
Figure 10: Creating two meshes

Note that the function name create_mesh  is not a part of the original binary and have been added later based on the function’s disassembled code. Next, it sets up lighting as shown in Figure 11.

Figure 11: Lighting up!
Figure 11: Lighting up!

Finally, it calls GetAsyncKeyState in an infinite loop listening for the state of the ESC key.

Figure 12: The Frame loop
Figure 12: The Frame loop

If ESC is not pressed. it goes on to draws a frame. This continues in a loop.

Analyzing setup_meshes

Inside setup_meshes we already saw two calls to create_mesh as in Figure 10. That’s strange considering we can only see a single mesh on the window – the rotating Flare logo. Let’s look inside create_mesh.

Figure 13: The create_mesh function

There is a call to D3DXCreateMeshFVF. The first two parameters of this function are the number of faces and number of vertices of the mesh respectively. Lets find out the number of faces and vertices for each of the mesh. This can be done by simply setting a breakpoint at the call instruction and inspecting the stack.

For the first mesh,

Figure 14: First Mesh
Figure 14: First Mesh

Number of faces = 0x38 = 56
Number of vertices = 0x1E = 30

For the second mesh,

Figure 14: Second Mesh
Figure 15: Second Mesh

Number of faces = 0x10A = 266
Number of vertices = 0x128 = 296

The second mesh has a large number of faces and vertices and its highly unlikely that it is the Flare logo. This mesh is probably hidden/not drawn and that’s why we cannot see it on the screen. Let’s see if we can make it visible.

Figure 16: The return value is stored in memory
Figure 16: The return value is stored in memory

The return value from create_mesh in eax is stored in memory as shown in Figure 16. For the first call, this goes to 0x430050, and 0x430054 for the second. Lets interchange those two memory locations. This can be easily done in x64dbg by double clicking the instruction and changing the addresses. Our patched code looks like Figure 17.

Figure 17: Swapping the memory locations

Now all that is left is to see the changes in action!

Figure 18: A change for the better!
Figure 18: A change for the better!

Instead of the rotating Flare logo, we have the rotating flag. Thus the second mesh was indeed the flag.

FLAG: [email protected]



Source link

Tags: CTFFlareOnPartWriteUp
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
Mobile Security

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026

January 21, 2026
Emerging Technology Management for Modern IT Leaders
Mobile Security

Emerging Technology Management for Modern IT Leaders

December 8, 2025
Adopting Blueprints in Jamf Tools
Mobile Security

Adopting Blueprints in Jamf Tools

December 8, 2025
Jamf Safe Internet + On-Device Phishing AI
Mobile Security

Jamf Safe Internet + On-Device Phishing AI

December 7, 2025
Act on Jamf Protect Alerts
Mobile Security

Act on Jamf Protect Alerts

December 7, 2025
Terraform + GitLab CI/CD for Jamf
Mobile Security

Terraform + GitLab CI/CD for Jamf

December 6, 2025
Next Post
Stadtwerke Detmold von Hackerangriff betroffen

Stadtwerke Detmold von Hackerangriff betroffen

Bank Account Unfreeze Karaye To Police Arrest Kar Sakte Hai | Cyber Crime Cell Freeze Bank Account

Bank Account Unfreeze Karaye To Police Arrest Kar Sakte Hai | Cyber Crime Cell Freeze Bank Account

Recommended Stories

A Delaware BEC Case calls him the leader of an International Criminal Organization

A Delaware BEC Case calls him the leader of an International Criminal Organization

November 23, 2025
ప్రజలను బాధిస్తున్న Top 3 Cyber Crimes in Telugu | Cyber Crime Awareness & Safety Tips | Part 1

ప్రజలను బాధిస్తున్న Top 3 Cyber Crimes in Telugu | Cyber Crime Awareness & Safety Tips | Part 1

October 11, 2025
How to Recover Money Lost to Cybercrime? | No Worry | Introducing a new procedure | Chennai Police

How to Recover Money Lost to Cybercrime? | No Worry | Introducing a new procedure | Chennai Police

November 26, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested