Exploit Flawed Code
Learn about tools and debugging mechanisms you can use to explore code as a network administrator: use a debugger to set a breakpoint, walk through code, and display variables; evaluate a portable executable (PE); an d explore the strings in an executable.
Already have an account? Sign In »

Note: Once you begin the challenge, you will not be able to pause, save, or exit and then return to your challenge. Please ensure that you have set aside enough time to complete the challenge before you start.
Understand the Scenario
You are a network and security administrator. You need to learn about tools and debugging mechanisms you can use to explore code. First, you will use a debugger to set a breakpoint, walk through code, and display variables. Next, you will evaluate a portable executable (PE). Finally, you will explore the strings in an executable.
Understand Your Environment
You will be using a Kali Linux™ virtual machine named Kalli Linux 2021 and a Windows® 10 virtual machine named WIN 10-CL-1.