Changes

Jump to navigation Jump to search
3,328 bytes added ,  Tuesday at 11:03
m
CTF section + content & CSAW ESC added.
:Resources for reverse engineering closed-source software to identify bugs, debug, and conduct penetration testing.
====Reverse engineeringEngineering Guides====
:Tools are great, and sometimes free! Without knowing how to use them, they can be a big waste of time. Better to spend your time learning the basics, then apply your knowledge.
::[http://ref.x86asm.net/ Reference x86] - Reference X86 Opcode and Instructions (the holy x86 assembly bible).
 
======x86 Training======
::[https://x86re.com/1.html Reverse Engineering for Noobs Part 1] - Brief introduction to RE, executables, compiling, 32-bit x86 syntax, and stack frames.
 
::[https://x86re.com/2.html Reverse Engineering for Noobs Part 2: Portable Executable Files] - Breakdown of Portable Executable image file headers and sections.
======x86 and amd64======
::[https://github.com/stakx/ecma-335/blob/master/docs/TABLE_OF_CONTENTS.md ECMA-335 Documentation] - This Standard defines the Common Language Infrastructure (CLI).
 
====Reverse Engineering Challenges====
 
::[https://crackmes.one/ Crackmes.one] - is a simple place where you can download crackmes to improve your reverse engineering skills.
 
::[https://crackmy.app/ CrackMy.App] - is as place to share your crackmes, solve challenges, and climb the leaderboard in the ultimate reverse engineering community.
 
====Security CTF====
Capture the Flag (CTF) in computer security is an exercise in which participants attempt to find text strings, called "flags", which are secretly hidden in purposefully vulnerable programs or websites.<br>
Learn more about reverse engineering and cybersecurity start playing CTF's.
 
::[https://jaimelightfoot.com/blog/so-you-want-to-ctf-a-beginners-guide/ CTF Beginners Guide] - is intended to be a guide for beginners who have just started playing CTFs (or for people who have never played, but would like to).
 
::[https://ctflearn.com/ CTFlearn] - The most beginner-friendly way to get into hacking. Challenges Test your skills by hacking your way through hundreds of challenges.
 
::[https://ctf101.org/ CTF101] - a site documenting the basics of playing Capture the Flags. This guide was written and maintained by the OSIRIS Lab at New York University.
 
::[https://picoctf.org/ picoCTF] - is a free computer security education program with original content built on a capture-the-flag framework created by security and privacy experts.
 
::[https://microcorruption.com/ MicroCorruption] - is a online, embedded debugger that starts from scratch and introduces the very foundations of memory corruption. Great practice for learning the basics of binary exploitation.
 
::[https://echoctf.red/ echoctf.red] - A platform to develop, run and administer CTF competitions. The online echoCTF.RED platform user interfaces and codebase.
 
::[https://pwnable.kr/ Wargames Pwnable.kr] - is a non-commercial wargame site which provides various pwn challenges regarding system exploitation, including reverse engineering, web exploitation, and cryptography.
 
::[https://pwnable.tw/challenge/ Wargames Pwnable.tw] - is a wargame site for hackers to test and expand their binary exploiting skills. HOW-TO. Try to find out the vulnerabilities exists.
 
::[https://ctfsites.github.io/ More CTF sites] - A curated list of more CTF sites on Github.
 
====Embedded security Challenge (ESC)====
 
::[https://github.com/TrustworthyComputing/csaw_esc_2024 csaw_esc_2024] - CSAW 2024 Embedded Security Challenge (Github repo).
 
::[https://github.com/TrustworthyComputing/csaw_esc_2023 csaw_esc_2023] - CSAW 2023 Embedded Security Challenge (Github repo).
 
::[https://github.com/TrustworthyComputing/csaw_esc_2022 csaw_esc_2022] - CSAW 2022 Embedded Security Challenge (Github repo).
 
::[https://github.com/TrustworthyComputing/csaw_esc_2021 csaw_esc_2021] - CSAW 2021 Embedded Security Challenge (Github repo).
 
::[https://github.com/TrustworthyComputing/csaw_esc_2019 csaw_esc_2019] - CSAW 2019 Embedded Security Challenge (Github repo).
====800 MHz AMPS Documentation====
::[https://wiki.recessim.com/w/images/8/86/Cellular_Telephone_Bible_With_SIDs.txt The Cellular Telephone Bible by Mike Larsen (1997)] Unlock codes and programming procedures of early 800 MHz analog AMPS cellular phones. This document also contains the system IDs (SID) of the 800 MHz analog service providers.

Navigation menu