I’m pretty new to reverse engineering and even the easy challenges here seem pretty complex. I’ve tried the “Find the easy pass” challenge using the immunity debugger and the amount of info just seems…large. No idea how to sort through all these instructions to find what’s really important. Any videos I find on reverse engineering seem to have a more academic take on it, and any practical videos usual use gdb on simple linux executables.
So, anyone have pointers (no pun intended) on getting up to speed on using a fully-fledged debugger for one of these “simple” challenges?
@LainIwakura said:
I’m pretty new to reverse engineering and even the easy challenges here seem pretty complex. I’ve tried the “Find the easy pass” challenge using the immunity debugger and the amount of info just seems…large. No idea how to sort through all these instructions to find what’s really important. Any videos I find on reverse engineering seem to have a more academic take on it, and any practical videos usual use gdb on simple linux executables.
So, anyone have pointers (no pun intended) on getting up to speed on using a fully-fledged debugger for one of these “simple” challenges?
I found https://www.youtube.com/watch?v=a2EkORFcSZo very helpful for getting started with immunity. I was in the same boat and have gone through a few of them now.