From 7e3629d83adc7a346147cc79174543c120db35fa Mon Sep 17 00:00:00 2001 From: epsteinmark Date: Thu, 17 Oct 2024 20:07:21 -0700 Subject: [PATCH 1/3] Add week 3 fundamentals to PBR Wiki --- src/fall-24/fundamentals/fundamentals-3.md | 15 +++++++++++++++ 1 file changed, 15 insertions(+) create mode 100644 src/fall-24/fundamentals/fundamentals-3.md diff --git a/src/fall-24/fundamentals/fundamentals-3.md b/src/fall-24/fundamentals/fundamentals-3.md new file mode 100644 index 0000000..d8e116b --- /dev/null +++ b/src/fall-24/fundamentals/fundamentals-3.md @@ -0,0 +1,15 @@ +# Fundamentals 3: Open Source Rev +by Mark Epstein + +You will (probably) spend more time reading code in your life than writing it. That being the case, the ability to figure out what it's doing, or reverse engineer it, is extremely important regardless of whether you stay in cybersecurity or move on to regular software engineering. Often when dealing with reverse engineering in cybersecurity, it's helpful to have a good understanding of how data is represented in memory. That will be our primary focus alongside a little more high level reverse engineering. + +## Slides + + +## Challenges +We will be doing challenges Character Numbers, just-dance, and brick-maze, available on our platform: [https://platform.acmcyber.com](https://platform.acmcyber.com). + +There are more challenges available there if you'd like to try them out. + +## Resources +A lot of open source reverse engineering is just getting used to reading code. There really aren't any tools or tricks. Just find a project on Github that seems interesting and start reading! \ No newline at end of file From 32fcc9e53891a9b27d8ae349bcc0b6b375597c4a Mon Sep 17 00:00:00 2001 From: AVDestroyer Date: Fri, 18 Oct 2024 22:48:22 -0700 Subject: [PATCH 2/3] finished fundamentals 3 wiki post --- src/SUMMARY.md | 1 + src/fall-24/fundamentals/fundamentals-3.md | 3 ++- 2 files changed, 3 insertions(+), 1 deletion(-) diff --git a/src/SUMMARY.md b/src/SUMMARY.md index 352585d..f97104f 100644 --- a/src/SUMMARY.md +++ b/src/SUMMARY.md @@ -7,6 +7,7 @@ - [Fundamentals](fall-24/fundamentals/fundamentals-1.md) - [1: Intro to Linux](fall-24/fundamentals/fundamentals-1.md) - [2: Forensics](fall-24/fundamentals/fundamentals-2.md) + - [3: Open Source Reverse Engineering](fall-24/fundamentals/fundamentals-3.md) - [Web](fall-24/web/web-1.md) - [1: Intro to Web & Client-Side Security](fall-24/web/web-1.md) - [2: HTTP Requests](fall-24/web/web-2.md) diff --git a/src/fall-24/fundamentals/fundamentals-3.md b/src/fall-24/fundamentals/fundamentals-3.md index d8e116b..c7809d8 100644 --- a/src/fall-24/fundamentals/fundamentals-3.md +++ b/src/fall-24/fundamentals/fundamentals-3.md @@ -12,4 +12,5 @@ We will be doing challenges Character Numbers, just-dance, and brick-maze, avail There are more challenges available there if you'd like to try them out. ## Resources -A lot of open source reverse engineering is just getting used to reading code. There really aren't any tools or tricks. Just find a project on Github that seems interesting and start reading! \ No newline at end of file +A lot of open source reverse engineering is just getting used to reading code. Just find a project on Github that seems interesting and start reading! +- [CyberChef](https://gchq.github.io/CyberChef/): An online tool that has a variety of different encoding and encryption schemes. This may be useful! \ No newline at end of file From 3075c67fc53e3a273596616b2dfa9e37ffd71ee2 Mon Sep 17 00:00:00 2001 From: AVDestroyer Date: Fri, 18 Oct 2024 22:50:30 -0700 Subject: [PATCH 3/3] fixed embed --- src/fall-24/fundamentals/fundamentals-3.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/fall-24/fundamentals/fundamentals-3.md b/src/fall-24/fundamentals/fundamentals-3.md index c7809d8..1e7e3ed 100644 --- a/src/fall-24/fundamentals/fundamentals-3.md +++ b/src/fall-24/fundamentals/fundamentals-3.md @@ -4,10 +4,10 @@ by Mark Epstein You will (probably) spend more time reading code in your life than writing it. That being the case, the ability to figure out what it's doing, or reverse engineer it, is extremely important regardless of whether you stay in cybersecurity or move on to regular software engineering. Often when dealing with reverse engineering in cybersecurity, it's helpful to have a good understanding of how data is represented in memory. That will be our primary focus alongside a little more high level reverse engineering. ## Slides - + ## Challenges -We will be doing challenges Character Numbers, just-dance, and brick-maze, available on our platform: [https://platform.acmcyber.com](https://platform.acmcyber.com). +We will be doing challenges rev/Character Numbers, rev/just-dance, and rev/brick-maze, available on our platform: [https://platform.acmcyber.com](https://platform.acmcyber.com). There are more challenges available there if you'd like to try them out.