
해킹 대회를 위한 시스템 해킹 프로토스타 완벽 풀이집
보안프로젝트
강의를 통해 프로토스타 튜토리얼은 여러 예제 프로그램을 통해 그 시스템 공격기법들의 원리를 이해할 수 있습니다.
초급
리버싱, 시스템 해킹
This is an introductory lecture on system hacking (Pwnable) for hacking competitions (CTF).
1,953 learners

Participating in a hacking competition (CTF)
System Hacking (Pwnable) Basics
C Language and Computer Basics for Hackers
The high barrier to entry into hacking is greatly reduced!
Understand and solve one vulnerability theory (Buffer Overflow) and its basic problems “perfectly”
All the knowledge needed to solve system hacking (pwnable) problems presented in computer-to-computer (CTF) competitions.
Understanding the challenges and solutions of a CTF (Computer-To-Function) competition
Through our self-operated Wargame site
You can practice 24 hours a day in a real hacking competition environment .
We provide a script and blog post containing all the lecture content.
You can focus on class and practice comfortably without worrying about notes.
I know many people who harbor romantic dreams and aspirations about becoming a hacker but are frustrated by the high barriers to entry . The unique feature of this course is that it allows even complete hacking beginners to experience and solve problems on their own.
Yes. Solve just one problem. Being able to solve one problem means being able to solve dozens or hundreds of related problems. Hacking problems aren't simply memorization problems , so mastering even just one problem is the right approach.
Instead of focusing on just one problem, this course covers all the knowledge necessary to solve hacking problems, including the C language, computer architecture, vulnerability theory, and exploit code writing. This will help you fully embody relevant knowledge and provide a solid foundation for future, more advanced learning.
💡 This is not a lecture for geniuses, but a class that lowers the barrier to entry for those interested in security.
• Master's program in Information Security at the Korea Advanced Institute of Science and Technology (KAIST)
• Graduated from the Department of Industrial Security at Chung-Ang University
Q. Do I have to know C to hack?
Yes. However, this course doesn't directly use the C language. Don't worry, we cover basic C language concepts enough to allow you to analyze the source code of the programs you'll be practicing.
Q. Is there anything I need to know before attending the lecture?
This course aims to provide a thorough foundation for more in-depth hacking studies. This course is designed for those who have never studied hacking or the C language before .
For those who are new to hacking, we will walk you through the entire process from booting up your computer to solving hacking problems on an actual Wargame site, so you can focus on the lecture with an easy mind.
Q. Setting up the environment is taking too long and difficult. I can't even get started. I guess I lack talent.
Absolutely not. You haven't even started anything yet. Configuration is crucial knowledge for system hacking. In fact, in hacking, especially system hacking , setting up the execution environment for the target program (binary) is crucial .
Even in major domestic and international hacking competitions, more than 40-50% of the time spent on configuring the environment through VM (Virtual Machine) or Docker for precise attacks is spent on solving problems. Therefore, environment configuration is a process and knowledge that must be gone through and familiarized in order to hack the system.
📢 Please check before taking the class
Who is this course right for?
Aspiring hackers who want to try their hand at a hacking competition (CTF) for the first time
People who are interested in security but have difficulty due to high barriers to entry
Anyone who wants to learn about system hacking (pwnable) and exploitation (attack).
Need to know before starting?
VMware installation and virtual environment creation are required in advance.
All
14 lectures ∙ (42min)
Course Materials:
All
64 reviews
Free
Explore other courses in the same field!