This is the introductory reverse engineering (RE) training from our Vulnerability Researcher Development Program. It provides instructions for both the Ghidra and Binary Ninja interactive disassemblers.
❗ While source code is provided, you are strongly encouraged to work through the exercises using the compiled binaries only.
❗ The training is intended to teach you static reverse engineering, so you are strongly encouraged to work through the exercises without using a debugger.
The compiled binaries are available from the latest release here.
Otherwise, building the exercises requires Docker.
docker build -t builder --platform linux/amd64 .
docker run -v "$PWD:/output" --platform linux/amd64 builder
# Binaries are in release.tar.gzIf you are building on a non-x86-64 Debian-based Linux distribution,
qemu-user-static and binfmt-support must be installed first.
sudo apt install -y qemu-user-static binfmt-support