Summary Introduction Reverse Engineering Function Address Basic ASM Cyborg Secrets Towers of Toast Police Records Web Exploitation No Comment Internet Inspection Delicious Injection 1 Potentially Hidden Password secure_page_service Make a Face Injection 2 Injection 4 Steve's List Cryptography Caesar The Valley of Fear ZOR Substitution Repeated XOR RSA ECC Low Entropy Block Web Interception Revenge of the Bleichenbacher RSA Mistakes Forensics Intercepted Post Snapcat PNG or Not? SSH Backdoor Binary Exploitation Overflow 1 Overflow 2 Format Guess Execute Me OBO ROP 1 Miscellaneous Tyrannosaurus Hex OBO