강의

멘토링

로드맵

Security & Network

/

Computer Security

Introduction to System Hacking (Pwnable) for Participating in Hacking Competitions (CTF)

This is an introductory lecture on system hacking (Pwnable) for hacking competitions (CTF).

(4.8) 59 reviews

1,884 learners

  • juntheworld
시스템 해킹
모의해킹
buffer-overflow
ctf
System Hacking
Penetration Testing
Thumbnail

Reviews from Early Learners

What you will learn!

  • Participating in a hacking competition (CTF)

  • System Hacking (Pwnable) Basics

  • C Language and Computer Basics for Hackers

The high barrier to entry into hacking is greatly reduced!

Is this your first time participating in a hackathon (CTF)?

Understand and solve one vulnerability theory (Buffer Overflow) and its basic problems “perfectly”

All the knowledge needed to solve system hacking (pwnable) problems presented in computer-to-computer (CTF) competitions.

Understanding the challenges and solutions of a CTF (Computer-To-Function) competition

Through our self-operated Wargame site
You can practice 24 hours a day in a real hacking competition environment .

Free scripts & blog posts provided ✅

We provide a script and blog post containing all the lecture content.

  • Free eBook : Link
  • Free lecture materials: Download the first lecture material (pdf)
  • Free Script : Check out the lecture notes for each class

You can focus on class and practice comfortably without worrying about notes.


Just one problem, solve it perfectly.

I know many people who harbor romantic dreams and aspirations about becoming a hacker but are frustrated by the high barriers to entry . The unique feature of this course is that it allows even complete hacking beginners to experience and solve problems on their own.

Aspiring hackers who want to try their hand at a hacking competition (CTF) for the first time

Anyone who wants to learn about system hacking (pwnable) and attacks (exploitation)

Those who are interested in security but have struggled with the high barriers to entry

'You're only solving one problem?'

Yes. Solve just one problem. Being able to solve one problem means being able to solve dozens or hundreds of related problems. Hacking problems aren't simply memorization problems , so mastering even just one problem is the right approach.

'You solved it perfectly?'

Instead of focusing on just one problem, this course covers all the knowledge necessary to solve hacking problems, including the C language, computer architecture, vulnerability theory, and exploit code writing. This will help you fully embody relevant knowledge and provide a solid foundation for future, more advanced learning.

💡 This is not a lecture for geniuses, but a class that lowers the barrier to entry for those interested in security.


What you learn
Check it out.

Analyze programs using Linux's dynamic debugger (GDB).

We analyze vulnerabilities built into the program you are analyzing in detail.

Learn computer architecture to understand the principles of vulnerabilities and attack techniques.

So, in this lecture!

  • ✅ We will solve hacking (Pwnable) problems in the CTF system.
  • ✅ Acquire the foundational knowledge for learning memory protection techniques and advanced hacking attack techniques.

• Completed KITRI BoB (Best of the Best) vulnerability analysis track
• Master's program in Information Security at the Korea Advanced Institute of Science and Technology (KAIST)
• Graduated from the Department of Industrial Security at Chung-Ang University


Q&A 💬

Q. Do I have to know C to hack?

Yes. However, this course doesn't directly use the C language. Don't worry, we cover basic C language concepts enough to allow you to analyze the source code of the programs you'll be practicing.

Q. Is there anything I need to know before attending the lecture?

This course aims to provide a thorough foundation for more in-depth hacking studies. This course is designed for those who have never studied hacking or the C language before .

For those who are new to hacking, we will walk you through the entire process from booting up your computer to solving hacking problems on an actual Wargame site, so you can focus on the lecture with an easy mind.

Q. Setting up the environment is taking too long and difficult. I can't even get started. I guess I lack talent.

Absolutely not. You haven't even started anything yet. Configuration is crucial knowledge for system hacking. In fact, in hacking, especially system hacking , setting up the execution environment for the target program (binary) is crucial .

Even in major domestic and international hacking competitions, more than 40-50% of the time spent on configuring the environment through VM (Virtual Machine) or Docker for precise attacks is spent on solving problems. Therefore, environment configuration is a process and knowledge that must be gone through and familiarized in order to hack the system.

📢 Please check before taking the class

  • The course uses Ubuntu 22.04 LTS operating system.
  • You will be using VMware, pwntools, and other hacking tools, and for practice you will need a PC with at least 8GB of RAM and sufficient disk space.
  • VMware installation and virtual environment setup are required in advance. (Installation instructions)
  • You can take the course without knowing C language grammar, but it will be a little easier if you do.
  • Each class includes a lecture script and free blog posts, so you can focus on the lecture without taking any notes.

Recommended for
these people

Who is this course right for?

  • Aspiring hackers who want to try their hand at a hacking competition (CTF) for the first time

  • People who are interested in security but have difficulty due to high barriers to entry

  • Anyone who wants to learn about system hacking (pwnable) and exploitation (attack).

Need to know before starting?

  • VMware installation and virtual environment creation are required in advance.

Hello
This is

1,884

Learners

59

Reviews

12

Answers

4.8

Rating

1

Course

Hello! Juntheworld

Curriculum

All

14 lectures ∙ (42min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

All

59 reviews

4.8

59 reviews

  • a05034182335님의 프로필 이미지
    a05034182335

    Reviews 3

    Average Rating 5.0

    5

    100% enrolled

    • glows235005님의 프로필 이미지
      glows235005

      Reviews 2

      Average Rating 5.0

      5

      100% enrolled

      • hhjung94020님의 프로필 이미지
        hhjung94020

        Reviews 9

        Average Rating 5.0

        5

        100% enrolled

        It was great to learn about system hacking. Thanks for the lecture!

        • sos62021382님의 프로필 이미지
          sos62021382

          Reviews 1

          Average Rating 5.0

          5

          100% enrolled

          • choisw1032님의 프로필 이미지
            choisw1032

            Reviews 3

            Average Rating 5.0

            5

            36% enrolled

            Free

            Similar courses

            Explore other courses in the same field!