{"componentChunkName":"component---src-templates-tag-template-js","path":"/tag/reversing-en/page/2","result":{"data":{"site":{"siteMetadata":{"title":"かえるのひみつきち","subtitle":""}},"allMarkdownRemark":{"edges":[{"node":{"fields":{"slug":"/ctf-metactf-2021-en","categorySlug":"/category/ctf-en/"},"frontmatter":{"title":"MetaCTF 2021 Writeup","date":"2021-12-06","category":"CTF (en)","description":"I took part in MetaCTF 2021, which ran from 12/4 to 12/5. This time I cleared all of the reversing challenges, so I'm writing up a few of the ones I found interesting."}}},{"node":{"fields":{"slug":"/ctf-k3rn3lctf-2021-en","categorySlug":"/category/ctf-en/"},"frontmatter":{"title":"K3RN3LCTF 2021 Writeup","date":"2021-11-15","category":"CTF (en)","description":"A brief writeup from K3RN3LCTF 2021 — an eccentric CTF that distributed actual malware in its Rev challenges."}}},{"node":{"fields":{"slug":"/ctf-wanictf-autum-2021-en","categorySlug":"/category/ctf-en/"},"frontmatter":{"title":"WaniCTF 2021 Autumn Writeup [Rev/Web/Forensic]","date":"2021-11-08","category":"CTF (en)","description":"Writeups for interesting and educational challenges from WaniCTF 2021 Autumn."}}},{"node":{"fields":{"slug":"/ctf-killer-queen-2021-en","categorySlug":"/category/ctf-en/"},"frontmatter":{"title":"Killer Queen CTF 2021 WriteUp","date":"2021-11-01","category":"CTF (en)","description":"Writeups for interesting and educational challenges from Killer Queen CTF 2021."}}},{"node":{"fields":{"slug":"/windows-windbg-006-symbol-en","categorySlug":"/category/windows-en/"},"frontmatter":{"title":"How to Generate Symbol Files (.pdb) in a Linux Environment Using llvm-mingw","date":"2021-10-18","category":"Windows (en)","description":""}}},{"node":{"fields":{"slug":"/windows-windbg-007-memory-spoofing-en","categorySlug":"/category/windows-en/"},"frontmatter":{"title":"Overwriting the Memory Pointed to by the Stack Pointer in WinDbg to Execute an Arbitrary Function","date":"2021-10-18","category":"Windows (en)","description":""}}},{"node":{"fields":{"slug":"/windows-windbg-008-time-travel-debugging-en","categorySlug":"/category/windows-en/"},"frontmatter":{"title":"[WinDbg Preview] A New Debugging Approach with Time Travel Debugging","date":"2021-10-18","category":"Windows (en)","description":""}}},{"node":{"fields":{"slug":"/windows-windbg-005-kernel-dump-en","categorySlug":"/category/windows-en/"},"frontmatter":{"title":"How to Manually Capture a Kernel Memory Dump on Windows and Analyze It with WinDbg","date":"2021-10-08","category":"Windows (en)","description":""}}},{"node":{"fields":{"slug":"/windows-windbg-004-kernel-debug-en","categorySlug":"/category/windows-en/"},"frontmatter":{"title":"First Steps for Kernel Debugging a Windows 10 Environment with WinDbg","date":"2021-10-06","category":"Windows (en)","description":"How to set up kernel-mode debugging with WinDbg on Windows 10 using Hyper-V or VirtualBox, and perform basic kernel debugging operations."}}},{"node":{"fields":{"slug":"/windows-windbg-002-tutorial-en","categorySlug":"/category/windows-en/"},"frontmatter":{"title":"Trying the WinDbg User-Mode Debugging Tutorial","date":"2021-10-05","category":"Windows (en)","description":""}}},{"node":{"fields":{"slug":"/windows-windbg-003-ui-en","categorySlug":"/category/windows-en/"},"frontmatter":{"title":"A Summary of the WinDbg Windows","date":"2021-10-05","category":"Windows (en)","description":""}}},{"node":{"fields":{"slug":"/ctf-angstromctf-2021-en","categorySlug":"/category/ctf-en/"},"frontmatter":{"title":"[Reversing Writeup] Infinity Gauntlet (ångstromCTF 2021)","date":"2021-10-04","category":"CTF (en)","description":"This time, I'm writing a writeup for Infinity Gauntlet, the challenge I learned the most from among the problems I managed to solve."}}}]}},"pageContext":{"tag":"Reversing (en)","currentPage":2,"postsLimit":12,"postsOffset":24,"prevPagePath":"/tag/reversing-en/page/1","nextPagePath":"/tag/reversing-en/page/3","hasPrevPage":true,"hasNextPage":true}},"staticQueryHashes":["251939775","401334301","825871152"]}