diff --git a/src/fall-24/fundamentals/fundamentals-3.md b/src/fall-24/fundamentals/fundamentals-3.md index c7809d8..1e7e3ed 100644 --- a/src/fall-24/fundamentals/fundamentals-3.md +++ b/src/fall-24/fundamentals/fundamentals-3.md @@ -4,10 +4,10 @@ by Mark Epstein You will (probably) spend more time reading code in your life than writing it. That being the case, the ability to figure out what it's doing, or reverse engineer it, is extremely important regardless of whether you stay in cybersecurity or move on to regular software engineering. Often when dealing with reverse engineering in cybersecurity, it's helpful to have a good understanding of how data is represented in memory. That will be our primary focus alongside a little more high level reverse engineering. ## Slides - + ## Challenges -We will be doing challenges Character Numbers, just-dance, and brick-maze, available on our platform: [https://platform.acmcyber.com](https://platform.acmcyber.com). +We will be doing challenges rev/Character Numbers, rev/just-dance, and rev/brick-maze, available on our platform: [https://platform.acmcyber.com](https://platform.acmcyber.com). There are more challenges available there if you'd like to try them out.