


Windows: 24 29 (obfuscation) 30 38 39 40 41 42 (unknown cryptoalgorithm) 43 44 45 (simple copyprotection) 46 (toy-level web server) 47 (broken data compression algorithm) 48 53 69 (bit field) 73 74 86. There are two questions for almost every exercise similar to the following (unless otherwise specified):ġ) What does this function do? Try to give one-sentence answer.Įxecutable file: 12 24 29 (obfuscation) 30 38 39 40 41 42 (unknown cryptoalgorithm) 43 44 45 (simple copyprotection) 46 (toy-level web server) 47 (broken data compression algorithm) 71 (structure) 73 74 86. So I can gather some statistics about exercises and promote/demote them. I would love to hear comments like "it was so easy/hard" or "I've spent 2 hours for this",
#Soundplant crack 42 free
Level 3: 25 (black boxes) 47 (broken data compression algorithm) 87.ĭistinction between levels is very blurred and not very strict, so don't rely on them fully.īut feel free to send me recommendations about them. Level 2: 1 24 29 (obfuscation) 40 42 (unknown cryptoalgorithm) 44 45 (simple copyprotection) 46 (toy-level web server) 73 74 77 78. Reverse Engineering challenges Reverse Engineering challengesĬontrived by Dennis Yurichev ( ).
