NSA 2019 Codebreaker Challenge
The 2019 Codebreaker Challenge consists of a series of tasks that are worth a varying amount of points based upon their difficulty. All tasks will become available immediately once the Challenge goes live and can be solved in any order, though there may be some dependencies between tasks. The point value associated with each task is based on relative difficulty and schools will be ranked according to the total number of points accumulated by their students. It is still recommended to solve tasks in order since the tasks flow with the storyline, but that is not a requirement.
The team has only gone up to Task 5 this year. These are individual notes for each team member. Note that each member has different types of files that are provided in the challenge and the answers may vary
Chris' Notes Jonah's Notes Jetro's Notes
Ghidra
History of Ghidra
Ghidra: A quick overview for the curious
Ghidra - Journey from Classified NSA Tool to Open Source
Tutorials
From NSA with notes
Ghidra Cheat Sheet
SFSCon
Introduction to Software Reverse Engineering with Ghidra
Moderately Advanced Ghidra Usage
Shoguns Lab's Take on Ghidra
Fun with Ghidra
CrackMe Exercises
Beginner Guide of Ghidra with crackme
Nora Codes
Explanations to the answers
The Leetcode of CrackMe
Reverse engineering with #Ghidra: Breaking an embedded firmware encryption scheme
Pull apart an EXE file with Ghidra (NSA Tool) (Reverse Engineering)
Interesting Videos and Lessons about Ghidra
Mike Bell: Extending Ghidra: from Script to Plugins and Beyond
Three Heads are Better Than One: Mastering Ghidra - Alexei Bulazel, Jeremy Blackthorne - INFILTRATE 2019
[Awesome Ghidra] Curated list of Ghidra related links - Allsafe