Don't like this style? Click here to change it! blue.css
The goal here is to learn how to use Radare2 to debug and reverse binaries.
So these are the first problems you can solve in x86 in the weekly CTFs.
I don't think I'll go deep into words here, rather we'll just do a bunch together and I'll encourage you to watch along on the video recording and learn by doing:
Find the flags: This GitHub Repo has crackme0x00a crackme0x00b and crackme0x01, solve them.
Here are some binaries from real CTFs of the recent past:
yopass CTF{sha256}
cat.elf ctf{sha256}
pwn_bazooka_bazooka CTF{sha256}
Now go do the PCP4!