<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>BambooFox on Asa&#39;s Website</title><link>https://ahessmat.netlify.com/tags/bamboofox/</link><description>Recent content in BambooFox on Asa&#39;s Website</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Fri, 17 Jan 2020 06:31:32 +0000</lastBuildDate><atom:link href="https://ahessmat.netlify.com/tags/bamboofox/index.xml" rel="self" type="application/rss+xml"/><item><title>First Reverse Engineering Writeup</title><link>https://ahessmat.netlify.com/post/2020-01-first-reverse-engineering-writeup/</link><pubDate>Fri, 17 Jan 2020 06:31:32 +0000</pubDate><guid>https://ahessmat.netlify.com/post/2020-01-first-reverse-engineering-writeup/</guid><description>Over the New Year&amp;rsquo;s holiday I decided to have a crack at the BambooFox CTF. Usually, my solo attempts at working through a CTF yield pretty marginal results. This time, however, I was pretty pleased with being able to solve my first &amp;ldquo;Reverse Engineering&amp;rdquo; -type problem.
I should preface this by saying this was an atypical problem. Most reverse engineering within CTFs involve decompiling/debugging an executable, such as an ELF binary.</description></item></channel></rss>