FE-Challenges

FE-Challenges

Train your skills in cyber security FE-challenges På FE Challenge, får du adgang til opgaver indenfor Krypto, Reversing og Forensic. Besøg FE Challenge og se om du kan løse opgaverne:  https://fechallenges.dk/kan-du-loese-opgaver-for-fe/ Krypto Gemmer budskabet på en...
Reverse Engineering Theory

Reverse Engineering Theory

Train your skills in cyber security Reverse Engineering Theory Welcome to this Course on Reverse Engineering. It is the first of two courses on Reverse Engineering: This course focuses on the theoretical foundations, but include also a practical challenge for trying...
Reverse Engineering Practice

Reverse Engineering Practice

Train your skills in cyber security Reverse Engineering Practice Welcome to this Course on Reverse Engineering. It is the second of two course on Reverse Engineering: While the first course focused on the theoretical foundations and the Radare2 framework, this course...
Code Analysis

Code Analysis

Train your skills in cyber security Code Analysis The course consists of two parts: First a set of readings about static taint analysis. Since it contains a fair bit of Mathematics, the readings are included as a PDF document. After reading the document, we invite you...
APR Spoofing

APR Spoofing

Train your skills in cyber security APR Spoofing In this short course you will learn about ARP, and how it is vulnerable to spoofing attacks. ARP stands for Address Resolution Protocol, and is used for resolving addresses between layer 2 and layer 3 in the OSI model...