Teaching myself Reverse Engineering - Lafarge CrackMe [RE Tutorial]
cybersecurity·@cristi·
0.000 HBDTeaching myself Reverse Engineering - Lafarge CrackMe [RE Tutorial]
One of the ways in which I teach myself reverse engineering is through hands-on practice. So, I take these binaries that are hosted on crackmes.one and I try to reverse them. In this context, reversing means, in most cases, either finding a code within the binary and/or writing a keygen for that specific binary; in some cases, patching is easy. Sometimes, binaries are packed and you need to use different techniques to unpack them so that you can get access and analyze the actual code itself. One of the binaries that I've played with was Lafarge #1. This may be easy to patch, but if you try to understand everything that goes on in its code, it might be very difficult. At least that's how it is for me. So, there is this 2013 2-hour long tutorial by JC Youtube channel that's very insightful. JC goes into minute detail of how to reverse this binary. If you're someone who wants to learn and understand how software reversing works, this is a good tutorial to work through. <center>https://www.youtube.com/watch?v=DEDYk8zN53A</center> ___ ### <center>To stay in touch with me, follow @cristi</center> ___ [Cristi Vlad](http://cristivlad.com) Self-Experimenter and Author
👍 cristi, brobear1995, hxr, mitchelljaworski, peakreal, vonaurolacu, siniceku, viorel, geke, jens84, team-leibniz, mrtv2, thetroublenotes, redes, decebal2dac, gavvet, dragonslayer109, jasonstaggers, timsaid, mandela, jacor, coinbitgold, thecryptofiend, alexvan, pharesim, jenkinrocket, gabrielatravels, irelandscape, veleje, scaredycatguide, stefanbx, jaki01, busy.pay, ace108,