Don't like this style? Click here to change it! blue.css

LOGIN:
Welcome .... Click here to logout

Reverse Engineering Crackmes

The goal here is to learn how to use Radare2 to debug and reverse binaries.

So these are the first problems you can solve in x86 in the weekly CTFs.

I don't think I'll go deep into words here, rather we'll just do a bunch together and I'll encourage you to watch along on the video recording and learn by doing:

First sets of "crackme"s

Find the flags: This GitHub Repo has crackme0x00a crackme0x00b and crackme0x01, solve them.

Here are some binaries from real CTFs of the recent past:

yopass CTF{sha256}

cat.elf ctf{sha256}

math.out

pwn_bazooka_bazooka CTF{sha256}

Now go do the PCP4!