Free lecture materials: Download the first lecture material (pdf)
Free Script : Check out the lecture notes for each class
You can focus on class and practice comfortably without worrying about notes.
Just one problem, solve it perfectly.
I know many people who harbor romantic dreams and aspirations about becoming a hacker but are frustrated by the high barriers to entry . The unique feature of this course is that it allows even complete hacking beginners to experience and solve problems on their own.
Aspiring hackers who want to try their hand at a hacking competition (CTF) for the first time
Anyone who wants to learn about system hacking (pwnable) and attacks (exploitation)
Those who are interested in security but have struggled with the high barriers to entry
'You're only solving one problem?'
Yes. Solve just one problem. Being able to solve one problem means being able to solve dozens or hundreds of related problems. Hacking problems aren't simply memorization problems , so mastering even just one problem is the right approach.
'You solved it perfectly?'
Instead of focusing on just one problem, this course covers all the knowledge necessary to solve hacking problems, including the C language, computer architecture, vulnerability theory, and exploit code writing. This will help you fully embody relevant knowledge and provide a solid foundation for future, more advanced learning.
💡 This is not a lecture for geniuses, but a class that lowers the barrier to entry for those interested in security.
What you learn Check it out.
Analyze programs using Linux's dynamic debugger (GDB).
We analyze vulnerabilities built into the program you are analyzing in detail.
Learn computer architecture to understand the principles of vulnerabilities and attack techniques.
So, in this lecture!
✅ We will solve hacking (Pwnable) problems in the CTF system.
✅ Acquire the foundational knowledge for learning memory protection techniques and advanced hacking attack techniques.
• Completed KITRI BoB (Best of the Best) vulnerability analysis track • Master's program in Information Security at the Korea Advanced Institute of Science and Technology (KAIST) • Graduated from the Department of Industrial Security at Chung-Ang University
Q&A 💬
Q. Do I have to know C to hack?
Yes. However, this course doesn't directly use the C language. Don't worry, we cover basic C language concepts enough to allow you to analyze the source code of the programs you'll be practicing.
Q. Is there anything I need to know before attending the lecture?
This course aims to provide a thorough foundation for more in-depth hacking studies. This course is designed for those who have never studied hacking or the C language before .
For those who are new to hacking, we will walk you through the entire process from booting up your computer to solving hacking problems on an actual Wargame site, so you can focus on the lecture with an easy mind.
Q. Setting up the environment is taking too long and difficult. I can't even get started. I guess I lack talent.
Absolutely not. You haven't even started anything yet. Configuration is crucial knowledge for system hacking. In fact, in hacking, especially system hacking , setting up the execution environment for the target program (binary) is crucial .
Even in major domestic and international hacking competitions, more than 40-50% of the time spent on configuring the environment through VM (Virtual Machine) or Docker for precise attacks is spent on solving problems. Therefore, environment configuration is a process and knowledge that must be gone through and familiarized in order to hack the system.
📢 Please check before taking the class
The course uses Ubuntu 22.04 LTS operating system.
You will be using VMware, pwntools, and other hacking tools, and for practice you will need a PC with at least 8GB of RAM and sufficient disk space.