How2rev

Rise, O Tarnished. Embark upon the sacred Path of reverse engineering through the CTF trials.

How2Rev

In this website, you will learn the path to reverse engineering. I will provide challenges that are essential for understanding reverse engineering concepts.

CTF-style challenges are a great way to grasp basic concepts and master them.
With each concept, you will have different resources to help you understand it, along with an associated challenge.

If you have questions or difficulties, you can ask for help on the Discord server: https://discord.gg/t6DDyUxA4H

Note: This website host self created lessons and external lessons, as well for challenge. My goal is to gather all the best resources for understanding concepts and mastering them.

Disclaimer & Information

This website does not check if you follow the correct path. My purpose is to provide an intended way to solve the challenges. You might be able to solve them by patching or using unintended methods, but that’s not the goal of this website.

Each flag will be saved as LRCTF{} (or as otherwise mentioned). You can check if you have the correct flag with the provided md5sum for each challenge:
echo -n "LRCTF{theFlag}" | md5sum (Only self-created challenge)

Many challenges come from past CTF events or are self-made. I recommend not searching for write-ups until you have made a solid attempt at a challenge—it’s much better to learn by trying hard to solve a difficult challenge.

C01 - Entry Point to the Reverse Engineering Path

In this module, you will learn the basics of reverse engineering:

C01 - Decompilation & Basic Reversing.
C01 - The ELF Format.

C02 - Low level reversing

In this module, we dive deep into low-level reversing, dealing with binaries that are difficult to emulate or debug. Here we will work with bootloaders, firmware, shellcode, etc.

C02 - Emulation & Custom Loaders
C02 - CPU Introduction

C03 - Obfuscation world

In this module, you will explore various obfuscation techniques used to make reverse engineering more challenging. You will learn about different methods of code obfuscation, how to identify them, and strategies to deobfuscate and analyze obfuscated code.

C03 - Virtual Obfuscation
C03 - Control Flow Flattening Obfuscation
C03 - Mixed Boolean Arithmetic Obfuscation

C04 - Mobile Time !

In this module, we are exploring Mobile reversing ! From APK pentesting to Objective C IOS headache :)

CO4 - Android Apps

C05 - Advanced Reverse Concept

Now that your familiar with basic reverse concepts, let’s explore more advanced things!

C05 - EBPF
C05 - Function Diffing & Symbol Reconstruction