Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That's the difficult part about documenting CTFs and reverse engineering tasks. In the past I tried to do it afterwards but it's a bit clunky. Now I try to do it at the same time, like a journal, and it's getting better (still not as good as OP :))


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: