This document provides an agenda for reverse engineering the (M)MORPG game Pwn Adventure 3. It begins with introducing the speaker and discussing the game structure and targets for reverse engineering. It then covers finding local saved data, reverse engineering the network protocol by identifying and dissecting packets, building a Wireshark dissector, and building an asynchronous proxy script to parse and edit network communication on the fly. The document provides guidance for completing these reverse engineering tasks through hands-on labs.