You can clear all the challenges of the hacking competition SquareCTF (2017).
What you will learn!
Methods and senses for discovering security vulnerabilities in the web, crypto, portable, reversing, and forensic areas.
Computer science knowledge relevant to each challenge.
How to install and use security tools.
Hacking Contest Challenge with “Hacking as a Hobby” !
Hacking as a hobby, hacking as a hobby.
※ “Hacking as a hobby” content only aims for legal hacking to contribute to a safe information security ecosystem.
< To view the course content in book form: Paper book/e-book (link) >
▶ Would you like to try your hand at a hacking competition by following the guide ?
▶ Do you want to become familiar with certain types of hackathon problems?
▶ Are you feeling uncomfortable and frustrated with hastily made Internet materials?
Here we will complete all the online challenges of SquareCTF (2017). We will go through and practice every challenge from start to finish.
SquareCTF is an international hacking competition hosted and organized by SQUARE.
* SQUARE: PayPal's competitor. A company run by Twitter CEO (Jack Dorsey).
If you complete all of the course content, you will be able to solve challenges that 98% of participants fail to clear, and as your skills improve, you will be able to challenge more difficult hacking competitions in the future.
The hacking competition covers five types of challenges: the portable area, where the goal is to infiltrate and take over the system ; the reversing area, where software is disassembled and modified at will ; the web area, where key information is stolen by bypassing the website’s lax security procedures ; the crypto area, where secrets are discovered by deciphering given passwords ; and the forensics area, where unauthorized activities are investigated based on the acquired information.
You will also modify (patch) some programs to check for special functions planted by developers, cause malfunctions by entering unexpected strings , write programs to understand encryption systems and decipher them, find rules in countless data piles to obtain hidden data, create attack codes one by one in machine language , and restore files hidden inside by playing compressed files that have been intentionally damaged .
You will learn how to discover and respond to vulnerabilities by practicing these various challenges. In detail, it includes theory and practice on bugs and vulnerabilities related to IDOR, SQLI, shellcode, steganography, decryption, and Git.
For effective learning, we provide a virtual image that reproduces the situation at the time of the competition . This allows you to practice as if you were participating in the competition. In addition, we cover how to install and use tools. Tools used include Ghidra, Pwntools, QEMU, FTK Imager, Checksec, 010 Editor, Wireshark, Scapy, Zsteg, PIL, BGB, etc.
The lecture focuses on minimizing individual learning by mentioning both phenomena and principles, but if you have any questions, please use the Q&A board in the Naver Cafe "Hacking as a Hobby (link) ".
For further details, please refer to the prologue video, which includes additional questions and answers.
Who is this course right for?
Anyone who wants to complete all the challenges of the hacking competition SquareCTF (2017).
Anyone who wants to learn hacking little by little as an academic hobby.
Anyone who wants to participate in more difficult hacking competitions.
Students in related departments who need to supplement their major knowledge.
Those who wish to pursue a career in information security.
Need to know before starting?
If you have experience writing C or Python programs, it may be helpful.
If you have taken Hacking as a hobby #1-5, this may be helpful.
10,494
Students
711
Reviews
118
Answers
4.7
Rating
9
Courses
ㆍ 정보보안기사
ㆍ "생활코딩! 파이썬" 도서 저자
ㆍ "취미로 해킹#N" 도서(+강의) 저자
ㆍ 한국외국어대학교 정보보안 담당 직원
ㆍ 미사일전략사령부 CERT 팀장(육군 학사#59)
ㆍ 한국공학대학교 컴퓨터공학 학사(4.42)
All
82 lectures ∙ (12hr 5min)
Intro
02:32
Password checker
10:05
The General's Cat(1)
11:14
The General's Cat(2)
09:43
The General's Cat(3)
06:49
Ciphercel(1)
08:29
Ciphercel(2)
08:44
Ciphercel(3)
08:58
Ciphercel(4)
10:07
Ciphercel(5)
08:37
Ciphercel(6)
09:18
Ciphercel(7)
08:14
Ciphercel(8)
11:32
Ciphercel(9)
08:02
Ciphercel(10)
05:29
Ciphercel(11)
09:43
Ciphercel(12)
09:56