I always liked play around with
reverse engineering tools to try and
figure out some
crackme challenges in
Capture The Flag events. I,
however, was never any good at it.
Last year I followed a
Malware Reverse Engineering course given by
Kaspersky Labs. I found out I had a natural intuition for the basic
process and soon after I became a Kaspersky Lab Certified Instructor
for the Malware Reverse Engineering course.
Reverse Engineering Virtual Machine
When I teach the material to other students I need a virtual machine with all the required tools. There are several virtual machines already available, such as FlareVM from FireEye, which will bootstrap an entire VM for your reversing needs.
Although I tend to use a subset of the packages available in this distributions I can fully recommend using it to get you started.
One of the more fun things I started exploring has been reversing mobile applications, specifically for Android.
I started building a script to create a reproducible environment with all the tools needed. Some of the tools that I use are: