Exploit Flawed Code

Learn about tools and debugging mechanisms you can use to explore code as a network administrator: use a debugger to set a breakpoint, walk through code, and display variables; evaluate a portable executable (PE); an d explore the strings in an executable.

Time
30 minutes
Difficulty
Beginner
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

Note: Once you begin the challenge, you will not be able to pause, save, or exit and then return to your challenge. Please ensure that you have set aside enough time to complete the challenge before you start.

Understand the Scenario

You are a network and security administrator. You need to learn about tools and debugging mechanisms you can use to explore code. First, you will use a debugger to set a breakpoint, walk through code, and display variables. Next, you will evaluate a portable executable (PE). Finally, you will explore the strings in an executable.

Understand Your Environment

You will be using a Kali Linux™ virtual machine named Kalli Linux 2021 and a Windows® 10 virtual machine named WIN 10-CL-1.