Skip to content

Latest commit

 

History

History
31 lines (24 loc) · 1.35 KB

README.md

File metadata and controls

31 lines (24 loc) · 1.35 KB

Reversing-Challenges

All binaries are ELF format

About

These challenges are for practicing your reverse engineering skills.
Challenges are in no specific order just because a challenge maybe be called level00 that does not mean it is easier then levelFF.
If you get this error or anything similar bash: file: cannot execute binary file: Exec format error this is intended.

Flags

The flag is a correct password and it is important to note that each challenge may have more then 1 correct password this is intended.

Rules

For any level: anything goes use anything and everything at your disposal.
misc00: Do not use a debugger of any kind.

New to reverse engineering?

Check out my blog https://medium.com/@Andromeda./introduction-to-reverse-engineering-251d6432f7ec

Tools

Tools to use for reverse engineering include:

  1. GDB (optional: pwndbg plugin)
  2. Disassembler (example: IDA)
  3. Hex editor (example: Okteta)
  4. Strace and ltrace
  5. Packer/Unpacker.
  6. Scripting language (example: Python)
  7. Text editor (example: Sublime text) (Note taking and scripting)

Contact me

If you have any questions about these challenges or reverse engineering in general feel free to message me on twitter https://twitter.com/3XPL017GH057 and I will get back to you as soon as I can.