Test your mettle while developing and polishing your reverse-engineering skills.
Go to http://0xevilc0de.com/ to find more information and sign-up for updates.
Further instructions will be posted there when the competition goes live.
If you have any questions please email firstname.lastname@example.org.
Participants will receive instructions on where to download the challenges at the start of the competition if signed-up for the newsletter. Additionally, instructions will be available at 0xevilc0de.com at the start of the competition. This is a virtual event, you are not required to be present in order to participate and do not need to register in advance.
Challenges will be assigned a point value based off of the difficulty. Total points awarded will be calculated using the point value from the challenge and the time of submission (for a correct answer). Point value decreases as the competition progresses. An overall score board will be maintained and accessible throughout the competition. Scoring is subject to change and will be documented on the site.
This is an individual competition, any indications of cheating will result in dismissal.
You will be required to provide your own environment in order to complete the challenges. As some challenges may have originated from a malicious source, the user of virtualization is suggested (VMWare Player, VirtualBox, etc). We also recommend that you have the following tools available at the start of the competition:
- IDA Pro
- CFF Explorer
- Hex Workshop
- Practical Malware Analysis
- IDA Pro Book
- Practical Reverse Engineering
- x86 Instruction Set Architecture
- Not sure if you’re ready?
Here are some recommended resources to help you get started.
- Hacking-Lab.com: This is an online ethical hacking, security and network challenge platform. You can subscribe to the free ‘Hacking Challenges’, which include a variety of reverse engineering challenges.
- HackThisSite.org (https://www.hackthissite.org/missions/application/) – Provides a series of progressively more advanced applicaiton challenges.
- Spend some time reading, and understanding, the following articles:
- While dated, still a good read: http://insecure.org/stf/smashstack.html
- Shellcode: http://www.safemode.org/files/zillion/shellcode/doc/Writing_shellcode.html
Contact us and we’ll help out!