Skip to content

Marc-andreLabonte/workshop-2024-Toolbox

Repository files navigation

Toolbox for reverse engineering and binary exploitation

Workshop @ NSEC 2024

Setup instructions

Clone with submodules

git clone --recurse-submodules

If you forgot the --recurse-submodules part, you can pull them after cloning:

git submodule update --init --recursive

Installation

As root:

Installer docker engine

apt install docker.io

Add your user to docker group (or invoke docker with sudo)

If docker would require a proxy on your computer:

Set proxy IP address and port in http-proxy.conf file

mkdir /etc/systemd/system/docker.service.d/
cp http-proxy.conf /etc/systemd/system/docker.service.d/
systemctl daemon-reload
systemctl restart docker

As user:

If a proxy is required:

Set proxy IP address and port in config.json file

Then, copy config.json in $HOME/.docker

mkdir ~/.docker
cp config.json ~/.docker/

build docker container

docker build --rm --tag workshop2024 .

Run docker container

docker run -it --rm -p 8888:8888 workshop2024

Download Ghidra or similar tool - https://github.com/NationalSecurityAgency/ghidra/releases/download/Ghidra_11.0.3_build/ghidra_11.0.3_PUBLIC_20240410.zip

About

Toolbox for reverse engineering and binary exploitation

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published