Skip to main content

Flare-On

Flare-On is a reverse engineering CTF ran formerly ran by Mandiant (now part of Google). It has been running since 2014 annually.

The process is simple, start at challenge 1, find the flag (which always fits the format <flag>@flare-on.com). When you input the flag correctly, it will unlock challenge 2 etc. Note that the challenges get arguably tougher.

This challenge is much more than basic reversing and string grepping. I’ve solved a few dozen of these in my spare time and they cover a large theme of challenges such as mildly different versions of known malicious techniques, encryption mechanisms and of course lots and lots of memes.

I can tell you for a fact that working through these challenges will make you a great reverse engineer but it is extremely tough and a major time sink. The glory of beating the challenge however is immeasurable.

I’m working my way through the challenges, so below is the current status of my progress. Click on completed icons to see my report.

01
FlareOn 01 (1/7)

2026

Flare-On1 - 05 - 5get_it
·2362 words·12 mins· loading
CTF Flare-On Flare-on-01
Challenge 5 of Flare-On 1.
Flare-On2 - 01 - Let's start Easy
·198 words·1 min· loading
CTF Flare-On Flare-on-02
Challenge 1 of Flare-On 2.
Flare-On1 - 01 - Bob Roge
·332 words·2 mins· loading
CTF Flare-On Flare-on-01
Challenge 1 of Flare-On 1.

2024

Flare-On1 - 02 - Javascrap
·918 words·5 mins· loading
CTF Flare-On Flare-on-01
Challenge 2 of Flare-On 1.
Flare-On1 - 03 - Shellolololol
·2517 words·12 mins· loading
CTF Flare-On Flare-on-01
Challenge 3 of Flare-On 1.
Flare-On1 - 04 - Sploitastic
·1960 words·10 mins· loading
CTF Flare-On Flare-on-01
Challenge 4 of Flare-On 1.