
Hacking as a hobby #2 (hacker's computing)
caliber50
You now have more freedom in cyberspace than ever before.
입문
Penetration Testing
You can clear all the challenges of the hacking competition SquareCTF (2017).
Methods and senses for discovering security vulnerabilities in the web, crypto, portable, reversing, and forensic areas.
Computer science knowledge relevant to each challenge.
How to install and use security tools.
Hacking Contest Challenge with "Hacking as a Hobby" !
Hacking as a hobby, hacking as a hobby.
※ "Hacking as a Hobby" content only focuses on legal hacking to contribute to a safe information security ecosystem.
< To view the course content in book form: Paper book/e-book (link) >
▶ Would you like to try your hand at a hacking competition by following the guide ?
▶ Want to get familiar with certain types of hackathon problems?
▶ Are you feeling uncomfortable and frustrated with hastily created Internet materials?
Here, we'll complete all the online challenges from SquareCTF (2017). We'll walk through each challenge from start to finish and practice.
SquareCTF is an international hacking competition hosted and organized by SQUARE.
* SQUARE: PayPal's competitor. A company run by Twitter CEO Jack Dorsey.
If you complete all the course content, you will be able to solve challenges that 98% of participants fail to clear, and as your skills improve, you will be able to challenge yourself in more difficult hacking competitions in the future.
Hacking competitions cover five types of challenges: the portable area, where the goal is to infiltrate and gain system privileges ; the reversing area, where software is disassembled and modified ; the web area, where key information is stolen by bypassing a website's lax security procedures ; the crypto area, where secrets are discovered by deciphering given ciphertext; and the forensics area, where unauthorized activity is investigated based on the acquired information.
You will also modify (patch) some programs to check for special functions planted by developers, cause malfunctions by entering unexpected strings , write programs to understand encryption systems and decipher them, find rules in countless piles of data to obtain hidden data, create attack codes one by one in machine language , and restore files hidden inside by playing compressed files that have been intentionally damaged .
By practicing these various challenges, you'll learn how to discover and address vulnerabilities . Specifically, the course covers theory and practice on bugs and vulnerabilities related to IDOR, SQLI, shellcode, steganography, decryption, and Git.
To ensure effective learning, we provide a virtual image that recreates the actual competition situation . This allows you to practice as if you were participating in the competition. We also cover how to install and use tools. Tools used include Ghidra, Pwntools, QEMU, FTK Imager, Checksec, 010 Editor, Wireshark, Scapy, Zsteg, PIL, and BGB.
The lecture focuses on minimizing individual learning by discussing both phenomena and principles, but if you have any questions, please use the Q&A board on the Naver Cafe "Hacking as a Hobby (link) ".
For further details, please refer to the prologue video, which includes additional questions and answers.
Who is this course right for?
Anyone who wants to complete all the challenges of the hacking competition SquareCTF (2017).
Anyone who wants to learn hacking little by little as an academic hobby.
Anyone who wants to participate in more difficult hacking competitions.
Students in related departments who need to supplement their major knowledge.
Those who wish to pursue a career in information security.
Need to know before starting?
If you have experience writing C or Python programs, it may be helpful.
If you have taken Hacking as a hobby #1-5, this may be helpful.
11,499
Learners
947
Reviews
118
Answers
4.7
Rating
9
Courses
ㆍ 정보보안기사
ㆍ "생활코딩! 파이썬" 도서 저자
ㆍ "취미로 해킹#N" 도서(+강의) 저자
ㆍ 한국외국어대학교 정보보안 담당 직원
ㆍ 미사일전략사령부 CERT 팀장(육군 학사#59)
ㆍ 한국공학대학교 컴퓨터공학 학사(4.42)
All
82 lectures ∙ (12hr 5min)
1. Intro
02:32
2. Config and Lore
09:24
12. Ciphercel(1)
08:29
13. Ciphercel(2)
08:44
14. Ciphercel(3)
08:58
15. Ciphercel(4)
10:07
16. Ciphercel(5)
08:37
17. Ciphercel(6)
09:18
18. Ciphercel(7)
08:14
19. Ciphercel(8)
11:32
20. Ciphercel(9)
08:02
21. Ciphercel(10)
05:29
22. Ciphercel(11)
09:43
23. Ciphercel(12)
09:56
All
7 reviews
5.0
7 reviews
Reviews 93
∙
Average Rating 5.0
Reviews 3
∙
Average Rating 5.0
Reviews 101
∙
Average Rating 5.0
Reviews 2
∙
Average Rating 5.0
Reviews 3
∙
Average Rating 5.0
Limited time deal ends in 5 days
$33.00
23%
$42.90
Check out other courses by the instructor!
Explore other courses in the same field!