I’m pretty new to reverse engineering and even the easy challenges here seem pretty complex. I’ve tried the “Find the easy pass” challenge using the immunity debugger and the amount of info just seems…large. No idea how to sort through all these instructions to find what’s really important. Any videos I find on reverse engineering seem to have a more academic take on it, and any practical videos usual use gdb on simple linux executables.
So, anyone have pointers (no pun intended) on getting up to speed on using a fully-fledged debugger for one of these “simple” challenges?