<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Reverse Engineering on JO's USB</title><link>https://josusb.com/tags/reverse-engineering/</link><description>Recent content in Reverse Engineering on JO's USB</description><generator>Hugo -- gohugo.io</generator><copyright>Copyright © 2021-2024 JO. All Rights Reserved.</copyright><lastBuildDate>Fri, 10 Sep 2021 00:00:00 +0000</lastBuildDate><atom:link href="https://josusb.com/tags/reverse-engineering/index.xml" rel="self" type="application/rss+xml"/><item><title>CTF Guide: You Can't C Me</title><link>https://josusb.com/blog/ctf-you-cant-c-me/</link><pubDate>Fri, 10 Sep 2021 00:00:00 +0000</pubDate><guid>https://josusb.com/blog/ctf-you-cant-c-me/</guid><description>Overview# You Can&amp;rsquo;t See Me is a fun CTF on Hack The Box that requires you to reverse engineer a simple C application. It&amp;rsquo;s generally rated as an &amp;ldquo;Easy&amp;rdquo; challenge, and is a good introduction to reversing software and performing malware analysis. As with the other CTF guides, answers will be blurred out. Also for brevity, I won&amp;rsquo;t be including all output of every command.
You can find the link to You Can&amp;rsquo;t See Me here.</description></item></channel></rss>