Learning Assembly/Reverse Engineering

Does anyone have some good, useful links for learning assembly related to exploiting and reverse engineering executable binaries (such as the ones in the Challenges here, for example)?

Most of what I find is very specific to the example program the creator is exploiting, and doesn’t really explain what all of the other stuff means or how they came to the solution they did. Any good resources would be much appreciated.


pwnable.kr and pwnable.tw

legend.octopuslabs.io has some good info. Be sure to download/run anything from the site in a VM though (just in case)!

Thanks, I’ll check that stuff out. :slight_smile: