Skip to content

Commit

Permalink
Add week 3 fundamentals to PBR Wiki
Browse files Browse the repository at this point in the history
  • Loading branch information
epsteinmark committed Oct 18, 2024
1 parent d16c3f1 commit 7e3629d
Showing 1 changed file with 15 additions and 0 deletions.
15 changes: 15 additions & 0 deletions src/fall-24/fundamentals/fundamentals-3.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
# Fundamentals 3: Open Source Rev
by Mark Epstein

You will (probably) spend more time reading code in your life than writing it. That being the case, the ability to figure out what it's doing, or reverse engineer it, is extremely important regardless of whether you stay in cybersecurity or move on to regular software engineering. Often when dealing with reverse engineering in cybersecurity, it's helpful to have a good understanding of how data is represented in memory. That will be our primary focus alongside a little more high level reverse engineering.

## Slides
<iframe src="https://docs.google.com/presentation/d/1XmXWAzQ1wU6Zl3RX9Vj4x_VHGvbexjszwTesgqsjQ60//embed?start=false&loop=false&delayms=3000" frameborder="0" width="960" height="569" allowfullscreen="true" mozallowfullscreen="true" webkitallowfullscreen="true"></iframe>

## Challenges
We will be doing challenges Character Numbers, just-dance, and brick-maze, available on our platform: [https://platform.acmcyber.com](https://platform.acmcyber.com).

There are more challenges available there if you'd like to try them out.

## Resources
A lot of open source reverse engineering is just getting used to reading code. There really aren't any tools or tricks. Just find a project on Github that seems interesting and start reading!

0 comments on commit 7e3629d

Please sign in to comment.