You are here |
0xeb.net | ||
| | | |
blog.nuculabs.de
|
|
| | | | I decided that I want to do something new and I started to get into assembly and reverse engineering, hopefully I can build a career with this. I watched some plural sight videos on the RE that gave me a nice introduction on subject but sadly nothing practical, and the content was not very detailed. I've tried to read a book on RE, Practical Reverse Engineering but that didn't help, I didn't understand assembly that well and I ended giving it up... until the beginning of this month, when I took initiative and started doing to Intro to x86 course from open security training, quite a nice course as it helped me understand assembly on a basic level, a thing that gave me courage to pursue RE further. I did the binary bomb challenge from the course but It gave me no satisfaction at all, I couldn't get the binary to run in the debugger and I had to use the IDA disassembler in order to solve it, then check with google if my solutions were correct. That was fine until phase 6, where I gave up as the assembly was difficult to understand. ?? | |
| | | |
blog.nuculabs.de
|
|
| | | | It's been some time since I've done some Reverse Engineering and today I've completed a simple challenge on . The filename of the challenge is crackme_wtf and here are some hints to get you started: Determine type of FILEs. Don't be afraid to patch and use a debugger. Try to eliminate the randomness. Maybe some functions that have to do with time, random numbers or the current process's id. If the last hint doesn't yield any results... Is the required password really needed to get to the flag? Thanks for reading and good luck! | |
| | | |
halestrom.net
|
|
| | | | ||
| | | |
www.iannaccone.org
|
|
| |