How2Rev
In this website, you will learn the path to reverse engineering. I will provide challenges that are essential for understanding reverse engineering concepts.
CTF-style challenges are a great way to grasp basic concepts and master them.
With each concept, you will have different resources to help you understand it, along with an associated challenge.
If you have questions or difficulties, you can ask for help on the Discord server: https://discord.gg/t6DDyUxA4H
Note: This website host self created lessons and external lessons, as well for challenge. My goal is to gather all the best resources for understanding concepts and mastering them.
Disclaimer & Information
This website does not check if you follow the correct path. My purpose is to provide an intended way to solve the challenges. You might be able to solve them by patching or using unintended methods, but that’s not the goal of this website.
Each flag will be saved as LRCTF{} (or as otherwise mentioned).
You can check if you have the correct flag with the provided md5sum for each challenge:
echo -n "LRCTF{theFlag}" | md5sum
(Only self-created challenge)
Many challenges come from past CTF events or are self-made. I recommend not searching for write-ups until you have made a solid attempt at a challenge—it’s much better to learn by trying hard to solve a difficult challenge.
C01 - Entry Point to the Reverse Engineering Path
In this module, you will learn the basics of reverse engineering:
C01 - Decompilation & Basic Reversing.
C01 - The ELF Format.
C02 - Low level reversing
In this module, we dive deep into low-level reversing, dealing with binaries that are difficult to emulate or debug. Here we will work with bootloaders, firmware, shellcode, etc.
C02 - Emulation & Custom Loaders
C02 - CPU Introduction
C03 - Obfuscation world
In this module, you will explore various obfuscation techniques used to make reverse engineering more challenging. You will learn about different methods of code obfuscation, how to identify them, and strategies to deobfuscate and analyze obfuscated code.
C03 - Virtual Obfuscation
C03 - Control Flow Flattening Obfuscation
C03 - Mixed Boolean Arithmetic Obfuscation
C04 - Mobile Time !
In this module, we are exploring Mobile reversing ! From APK pentesting to Objective C IOS headache :)
C05 - Advanced Reverse Concept
Now that your familiar with basic reverse concepts, let’s explore more advanced things!