Free Course Materials: Download from the first lecture materials (pdf)
Free Script: Check lecture notes for every class
No need to worry about taking notes—just relax and focus on the class and hands-on practice.
We solve just one problem, but perfectly.
I know well those who have the romance and dreams of becoming a hacker but have been frustrated by the high entry barrier. The characteristic of this course is to enable even those who are completely new to hacking to experience and solve every step of the problem on their own.
Aspiring hackers who want to try their first hacking competition (CTF)
Those who want to learn about system hacking(Pwnable) and exploitation(Exploitation)
Those who are interested in security but have struggled with the high entry barrier
'You only solve one problem?'
Yes. We solve just one problem. Being able to solve one problem means you can solve dozens or hundreds of related problems. Since hacking problems aren't simple memorization exercises, thoroughly internalizing even a single problem is the right approach.
'Solve it perfectly?'
Instead of solving just one problem, we cover all the knowledge needed to solve hacking problems, including C language, computer architecture, vulnerability theory, and exploit code writing. This helps you fully internalize the related knowledge and provides a solid foundation for learning advanced content later on.
💡 This is not a lecture for geniuses, but a class that lowers the entry barrier for those interested in security.
Check out what you'll learn.
Analyze programs using Linux's dynamic debugger (GDB).
Analyze in detail the vulnerabilities embedded in the program being analyzed.
Learn computer architecture to understand the principles of vulnerabilities and attack techniques.
So, in this course!
✅ Solve Capture The Flag (CTF) system hacking (Pwnable) challenges.
✅ Acquire foundational knowledge for learning memory protection techniques and advanced hacking attack methods.
I notice that the `` tags are empty - there is no Korean text between them to translate.
The surrounding context shows:
- **Before**: Text about CTF hacking competitions and system hacking (Pwnable) problem-solving, and learning memory protection techniques
- **After**: Text about KITRI BoB certification, KAIST graduate program, and university graduation
However, since there is no actual content between the `` tags to translate, I cannot provide a translation. Please provide the Korean text you'd like me to translate.
• Completed KITRI BoB(Best Of the Best) Vulnerability Analysis Track • Master's Program at Korea Advanced Institute of Science and Technology (KAIST) Graduate School of Information Security • Graduated from Chung-Ang University, Department of Industrial Security
Q&A 💬
Q. Do I need to know C language to do hacking?
Yes. However, this course does not directly involve using C language. We cover basic C language content enough to analyze the source code of the programs used in practice, so don't worry too much.
Q. Is there any knowledge I need to have before taking the course?
This course aims to help you acquire the perfect foundational knowledge for more advanced hacking studies. This is a course prepared for those who have never studied hacking or C language even once.
For those studying hacking for the first time, we'll go through every step from booting up your computer to solving actual hacking problems on Wargame sites, so you can relax and just focus on the lectures.
Q. The environment setup is taking too long and is too difficult. I haven't even started anything yet, so I guess I don't have the talent for this.
Absolutely not. What do you mean you haven't started anything? Configuration is very important knowledge for system hacking. In fact, in hacking, especially system hacking, building the execution environment for your target attack program (binary) is very important.
In major domestic and international hacking competitions, you need to spend 40-50% or more of your problem-solving time on environment configuration through VM (Virtual Machine) or Docker for precise attacks, making environment setup a process and knowledge that you must go through and become familiar with for system hacking.
📢 Please check before enrolling
The course uses the Ubuntu 22.04 LTS operating system.
VMware, pwntools, and other hacking tools will be used, and for hands-on practice, a PC with at least 8GB of RAM and sufficient disk space is required.
VMware installation and virtual environment setup are required in advance. (Installation Guide)
You can take this course even without knowledge of C language syntax, but it will be somewhat easier if you know it.
Lecture scripts and free blog posts are provided for each class, so you can focus solely on the lecture without taking separate notes.
Recommended for these people
Who is this course right for?
A budding hacker who wants to try their first hacking competition (CTF)
Someone who is interested in security but struggled with the high barrier to entry
People who want to learn about system hacking (Pwnable) and exploitation (attacks)
Need to know before starting?
VMware installation and virtual environment setup are required in advance.