Challenge: Packed Snacks
In this challenge, you will take on a reverse engineering challenge by analyzing a binary file.. Malicious attackers will always use malware or custom binary files to execute their goals. The goal is to show from an analyst POV how to do basic file analysis.
Already have an account? Sign In »

Module 1: Snacks
Blue Team Analyst POV: Reversing
In this week's challenge, malicious attackers often utilize various forms of malware or custom binary files to execute their goals. These files can pose a significant threat to computer systems and networks, making it crucial for analysts to have a thorough understanding of how to analyze them. Successfully analyzing the binary file, participants will be able to demonstrate their proficiency in basic file analysis and reverse engineering. This skillset is essential in the field of cybersecurity, where analysts must constantly stay one step ahead of attackers to safeguard their organization's digital assets.
Who is this for?
Early career to mid practitioners. This challenge may be difficult for individuals new to cybersecurity, but the difficulty rating on this challenge would be considered intermediate. We encourage using any internet resources and community/colleague assistance in completing the challenge.
Are write ups permitted?
Yes, write-ups are permitted; please do not post answers directly. All write-ups should include a link to Cybrary and the Cybrary Course.
What resources are available to help solve this challenge?
Online search, community, colleagues, or fellow practitioners.

Marc Balingit
Security Researcher - Incident Response


Complete this entire course to earn a Challenge: Packed Snacks Certificate of Completion