강의

멘토링

로드맵

BEST
Security & Network

/

Computer Security

Hacking as a hobby #5 (DIMICTF)

You can clear all preliminary challenges of the hacking competition DIMICTF (2019).

(4.9) 17 reviews

483 learners

  • caliber50
Penetration Testing
Reversing
System Hacking

Reviews from Early Learners

What you will learn!

  • How to find and understand security vulnerabilities related to portable, reversing, web, and mask areas.

  • Computer science knowledge relevant to each challenge.

  • How to install and use security tools.

Hacking as a hobby, hacking as a hobby.
※ "Hacking as a Hobby" content only focuses on legal hacking to contribute to a safe information security ecosystem.

< To view the course content in book form: Paper book/e-book (link) >

Hacking as a hobby #5 (DIMICTF)

▶ Would you like to participate in a hacking competition ?

▶ Do you feel like you participated but didn't learn anything because there was no feedback ?

▶ Even if you were lucky enough to find a solution online, did you feel frustrated and resentful because the quality of the material was poor or it only contained terms that only they knew?

If so, you may be able to get help here.



Here, we'll master the 2019 DIMICTF Preliminary Challenge (which is said to be more difficult than the final). We'll practice every challenge from start to finish.

DIMICTF is sponsored by the Ministry of Science and ICT and the Korea Information Technology Research Institute.
This is a domestic hacking competition hosted and organized by Korea Digital Media High School.


If you master all the course content, you will be able to solve challenges that the winning team couldn't, and as your skills improve, you will be able to challenge yourself in more difficult hacking competitions in the future.

Hacking competitions cover four main areas: the portable area, which involves system hacking and primarily aims to seize authority ; the reversing area, which involves disassembling software and searching for key information hidden somewhere inside, like a treasure hunt ; the web area, which involves bypassing a website's lax security procedures to extract key information; and the mask area, where vulnerability detection is more important than specific knowledge.

You will learn about finding Easter eggs that developers have secretly hidden, uploading files with specific extensions that are blocked from being uploaded, creating attack codes one by one in machine language , invading inaccessible memory areas to trigger unplanned functions, restoring obfuscated software to its original state, and injecting various special characters in combinations into user-interactive areas such as login pages to activate hidden functions .

By practicing various challenges that incorporate the above content, you will learn how to identify and address vulnerabilities . Specifically, the course includes theory and practice on bugs and vulnerabilities related to the keywords mentioned in the image below.


To ensure effective learning, we provide a virtual image that recreates the actual competition situation . This allows you to practice as if you were participating in the competition. We also cover how to install and use tools. Tools used include Ghidra, GDB-PEDA, JD-GUI, Checksec, and Uncompyle6.

The lecture focuses on minimizing individual learning by discussing both phenomena and principles, but if you have any questions, please use the Q&A board on the Naver Cafe "Hacking as a Hobby (link) ".


For further details, please refer to the prologue video, which contains answers to the questions below.

▶ What is an effective way to study?
▶ How is the lecture conducted?
▶ What is your relationship with "Hacking as a Hobby #1-4"?
▶ What are the differences from other courses?

Note

Recommended for
these people

Who is this course right for?

  • Anyone who wants to complete all preliminary challenges of the hackathon DIMICTF.

  • Anyone who wants to learn hacking little by little as an academic hobby.

  • Anyone who wants to participate in more difficult hacking competitions.

  • Students in related departments who need to supplement their major knowledge.

  • Those who wish to pursue a career in information security.

Need to know before starting?

  • If you have experience writing C or Python programs, it may be helpful.

Hello
This is

11,497

Learners

946

Reviews

118

Answers

4.7

Rating

9

Courses

ㆍ 정보보안기사
ㆍ "생활코딩! 파이썬" 도서 저자
ㆍ "취미로 해킹#N" 도서(+강의) 저자
ㆍ 한국외국어대학교 정보보안 담당 직원
ㆍ 미사일전략사령부 CERT 팀장(육군 학사#59)
ㆍ 한국공학대학교 컴퓨터공학 학사(4.42)

Curriculum

All

96 lectures ∙ (13hr 16min)

Published: 
Last updated: 

Reviews

All

17 reviews

4.9

17 reviews

  • 박근우님의 프로필 이미지
    박근우

    Reviews 2

    Average Rating 5.0

    5

    5% enrolled

    점점 강의력이 향상되시네요. 보기 좋습니다. 이번에도 잘 배웠습니다.

    • codersangmin님의 프로필 이미지
      codersangmin

      Reviews 1

      Average Rating 5.0

      5

      100% enrolled

      좋았습니다

      • 삐약님의 프로필 이미지
        삐약

        Reviews 2

        Average Rating 5.0

        5

        100% enrolled

        재미있었습니다.

        • 인공지능조한수님의 프로필 이미지
          인공지능조한수

          Reviews 7

          Average Rating 5.0

          5

          100% enrolled

          감사합니다.

          • condition님의 프로필 이미지
            condition

            Reviews 1

            Average Rating 5.0

            5

            100% enrolled

            역시좋은강의입니다

            Limited time deal ends in 8 days

            $41,250.00

            25%

            $42.90

            caliber50's other courses

            Check out other courses by the instructor!

            Similar courses

            Explore other courses in the same field!