Free
Challenge: Between Two Numbers
In this challenge, you will take on a reverse engineering challenge by analyzing a binary file. Malicious attackers will always use malware or custom binary files to execute their goals. The goal is to show from an analyst point of view (POV) how to do basic file analysis.
0
H
30
M
Time
beginner
difficulty
1
ceu/cpe
Course Content
Crack the Code
Reverse Engineer
Course Description