This repository contains my notes and analysis of the IOLI crackme challenges, a classic set of binaries used to practice binary reversing.
🔗 Original binaries:
https://github.com/Maijin/radare2-workshop-2015/tree/master/IOLI-crackme
The IOLI challenges were created several years ago with the goal of helping users learn reverse engineering, originally focusing on the use of Radare2.
However, the binaries are tool-agnostic and can be analyzed with any disassembler or debugger. In my case, I use IDA.
All challenges share the following characteristics:
- Windows x86 (32-bit) binaries
- Progressive difficulty across levels
- Focused on static analysis and reversing logic, not exploitation
They start out very simple and gradually become more complicated as the levels increase.
Since these challenges are designed for reversing, for me the main challenge is not to get a flag, but to learn as much as possible about this binary using IDA (in my case).
Therefore, there are several challenges that are very similar to each other and only change the internal composition of the functions or variables.