Worth reading: Comic explains reverse engineering
As part of the CTF (Capture The Flag) competition which ran ahead of the DEFCON hacker conference, a comic was published about reverse engineering. Part of CTF was a challenge to extract a crypto key from inside a executable file named B300.exe. The comic offers a surprisingly deep insight into the programs and techniques involved in reverse engineering as it follows a hacker team in analysing the B300.exe file. The process involves bypassing a number of anti-debugging measures in the file.
- Analysis of B300.exe Comic on the analysis of B300.exe on Hackerschool.org.
(trk)








![Kernel Log: Coming in 3.10 (Part 3) [--] Infrastructure](/imgs/43/1/0/4/2/6/7/2/comingin310_4_kicker-4977194bfb0de0d7.png)

![Kernel Log: Coming in 3.10 (Part 3) [--] Infrastructure](/imgs/43/1/0/4/2/3/2/3/comingin310_3_kicker-151cd7b9e9660f05.png)








