This repository contains the practice challenges used in the Reverse Engineering Workshop conducted on 10 March as part of WTF 3.0.
The purpose of these exercises is to introduce participants to the fundamentals of reverse engineering before the main CTF event on 26 March.
Participants will analyze compiled binaries and attempt to understand how the programs work internally in order to determine the correct input accepted by each program.
The exercises are designed to help beginners understand:
- What executable binaries are
- How compiled programs validate user input
- How to analyze binaries using static analysis tools
- How to reconstruct program logic using decompilers
- How data transformations affect program checks
These are foundational concepts commonly used in reverse engineering and CTF competitions.