강의

멘토링

커뮤니티

BEST
Security & Network

/

Computer Security

Hacking as a hobby #4 (Nebula)

We will cover all the challenges in Nebula, a wargame that will help you develop your system hacking skills, from start to finish, including setting up a practice environment. You will also learn the computer science knowledge required for each challenge.

(4.9) 19 reviews

491 learners

Level Basic

Course period Unlimited

  • caliber50
Penetration Testing
Penetration Testing
Network
Network
System Hacking
System Hacking
Penetration Testing
Penetration Testing
Network
Network
System Hacking
System Hacking

Reviews from Early Learners

Reviews from Early Learners

4.9

5.0

SEOYEON_KIM

8% enrolled

First of all, the voice is good and the explanation is good. Haha It's not hard to follow. Since it's done through a war game, it's less burdensome and the decisive thing is fun.

5.0

rini9

100% enrolled

It was a good lecture.

5.0

whopdo

100% enrolled

I heard it well

What you will gain after the course

  • Primarily the ability and intuition to discover system-related vulnerabilities.

  • Computer science knowledge relevant to each challenge.

Hacking as a hobby, hacking as a hobby.
※ "Hacking as a Hobby" content only focuses on legal hacking to contribute to a safe information security ecosystem.

< To view the course content in book form: Paper book/e-book (link) >

Hacking as a Hobby #4 (Nebula)

▶ After "Hacking as a Hobby #1", are you looking for a system hacking challenge to use more difficult skills ?

▶ Do you want to develop the ability to analyze source code (C language, etc.) that will help with reversing ?

▶ Would you like to try your hand at a system-related challenge at a hacking competition ?

If so, you may be able to get help here.



Here, we'll master the popular wargame Nebula . Based on fully translated Korean materials, we'll practice every challenge from start to finish.

We'll discover and exploit vulnerabilities in Linux systems, widely used as servers , and gradually escalate privileges . Through this, you'll discover that most vulnerabilities are the result of mistakes made by developers who lack security knowledge . You'll witness programs that become hostile due to competition. You'll witness how poor data filtering can lead to program collapse . You'll witness how abuse of privileges can lead to outside interference . You'll also witness how poorly applied security knowledge can lead to certain functions being replaced with others .

You'll learn how to discover and mitigate system-related security vulnerabilities through a variety of scenarios. Specifically, you'll cover theory and practice on vulnerabilities related to permissions (general/special), relative paths, environment variables, input filtering, schedulers, password hashes, code injection, cleartext communication, legacy open source, race conditions, variable initialization, library hooking, data encryption, file attributes, deserialization, permission checks, and exception handling.


[Q1] I didn't take "Hacking as a Hobby #1-3." Is it okay to start from here?
[Ans] If you have at least basic Linux system skills (connection, compilation, navigation, text editing, etc.) , this shouldn't be a problem. If you don't, we recommend separate learning or taking the most relevant course, "Hacking as a Hobby #1."

[Q2] What abilities will you acquire when you complete the course?
[Ans] You will learn how to exploit various vulnerabilities in the Linux environment. You will gain more advanced skills in addressing the aforementioned vulnerabilities than before, enabling you to develop more secure programs. Additionally, the extensive source code analysis included will be helpful for future reversing challenges.

Note

Recommended for
these people

Who is this course right for?

  • For those who want to complete all the content of Wargame Nebula.

  • Anyone who wants to learn hacking little by little as an academic hobby.

  • Anyone who wants to participate in domestic/international hacking competitions in the future.

  • Students in related departments who need to supplement their major knowledge.

  • Those who wish to pursue a career in information security.

Need to know before starting?

  • If you have experience writing C programs, it may be helpful.

Hello
This is

11,802

Learners

1,005

Reviews

118

Answers

4.7

Rating

9

Courses

ㆍ Information Security Engineer
ㆍ Author of "Coding Everybody! Python"
ㆍ Author of "Hacking as a Hobby #N" (Book & Lectures)
ㆍ Information Security Officer at Hankuk University of Foreign Studies
ㆍ CERT Team Leader at Missile Strategy Command (Army OCS #59)
ㆍ B.S. in Computer Science and Engineering, Tech University of Korea (4.42 GPA)

Curriculum

All

37 lectures ∙ (6hr 16min)

Published: 
Last updated: 

Reviews

All

19 reviews

4.9

19 reviews

  • nowindesire9738님의 프로필 이미지
    nowindesire9738

    Reviews 1

    Average Rating 5.0

    5

    8% enrolled

    First of all, the voice is good and the explanation is good. Haha It's not hard to follow. Since it's done through a war game, it's less burdensome and the decisive thing is fun.

    • rini92840님의 프로필 이미지
      rini92840

      Reviews 6

      Average Rating 5.0

      5

      100% enrolled

      It was a good lecture.

      • whopdo0694님의 프로필 이미지
        whopdo0694

        Reviews 3

        Average Rating 3.7

        5

        100% enrolled

        I heard it well

        • audwlstka22352님의 프로필 이미지
          audwlstka22352

          Reviews 5

          Average Rating 5.0

          5

          100% enrolled

          I heard it well.

          • simsonmin1411님의 프로필 이미지
            simsonmin1411

            Reviews 5

            Average Rating 4.8

            5

            100% enrolled

            I had a great time in class. Thank you.

            $26.40

            caliber50's other courses

            Check out other courses by the instructor!

            Similar courses

            Explore other courses in the same field!