From 3075c67fc53e3a273596616b2dfa9e37ffd71ee2 Mon Sep 17 00:00:00 2001 From: AVDestroyer Date: Fri, 18 Oct 2024 22:50:30 -0700 Subject: [PATCH] fixed embed --- src/fall-24/fundamentals/fundamentals-3.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/fall-24/fundamentals/fundamentals-3.md b/src/fall-24/fundamentals/fundamentals-3.md index c7809d8..1e7e3ed 100644 --- a/src/fall-24/fundamentals/fundamentals-3.md +++ b/src/fall-24/fundamentals/fundamentals-3.md @@ -4,10 +4,10 @@ by Mark Epstein You will (probably) spend more time reading code in your life than writing it. That being the case, the ability to figure out what it's doing, or reverse engineer it, is extremely important regardless of whether you stay in cybersecurity or move on to regular software engineering. Often when dealing with reverse engineering in cybersecurity, it's helpful to have a good understanding of how data is represented in memory. That will be our primary focus alongside a little more high level reverse engineering. ## Slides - + ## Challenges -We will be doing challenges Character Numbers, just-dance, and brick-maze, available on our platform: [https://platform.acmcyber.com](https://platform.acmcyber.com). +We will be doing challenges rev/Character Numbers, rev/just-dance, and rev/brick-maze, available on our platform: [https://platform.acmcyber.com](https://platform.acmcyber.com). There are more challenges available there if you'd like to try them out.