pwncollege
DojosLeaderboardCommunity
Back to cse365-f2023

Reverse Engineering

cse365-f2023
0/30 challenges completed

Now that you've developed expertise in reading and writing assembly code, we'll put that knowledge to the test in reverse engineering binaries!

First you'll learn the magic of gdb, then reverse engineer binaries.

For the Debugging Refresher levels, the challenge is in /challenge, but named differently for each level. Make sure you read the output, it will drop you into gdb. From there there run run to get started. Follow the output to keep going

For the Reverse Engineering levels, the challenge is in /challenge, but named differently for each level. The levelX.0 are "teaching" challenges that have output that shows what the challenge is doing. The levelX.1 challenges are similar (but not the same) but have no output: you'll need to reverse engineer the binary.

Class Material: Reverse Engineering
GDB Help
Robert's GDB Walkthrough
Video
Other Resources
Useful Tools
Prior Course Material
1
Debugging Refresher: level1
2
Debugging Refresher: level2
3
Debugging Refresher: level3
4
Debugging Refresher: level4
5
Debugging Refresher: level5
6
Debugging Refresher: level6
7
Debugging Refresher: level7
8
Debugging Refresher: level8
9
Reverse Engineering: level1.0
10
Reverse Engineering: level1.1
11
Reverse Engineering: level2.0
12
Reverse Engineering: level2.1
13
Reverse Engineering: level3.0
14
Reverse Engineering: level3.1
15
Reverse Engineering: level4.0
16
Reverse Engineering: level4.1
17
Reverse Engineering: level5.0
18
Reverse Engineering: level5.1
19
Reverse Engineering: level6.0
20
Reverse Engineering: level6.1
21
Reverse Engineering: level7.0
22
Reverse Engineering: level7.1
23
Reverse Engineering: level8.0
24
Reverse Engineering: level8.1
25
Reverse Engineering: level9.0
26
Reverse Engineering: level9.1
27
Reverse Engineering: level10.0
28
Reverse Engineering: level10.1
29
Reverse Engineering: level11.0
30
Reverse Engineering: level11.1