
Hacking as a Hobby #1 (OverTheWire - Bandit)
caliber50
If you have ever felt attracted to someone typing mysterious Linux commands on a black screen but felt lost on where or how to start, this course can help you.
Basic
Linux, System Hacking
While tackling Nebula, a wargame designed to develop system hacking skills, I have included a complete translation and solutions for all challenges, including the setup of the practice environment from start to finish. Additionally, you can acquire the computer science knowledge required for each challenge.
498 learners
Level Basic
Course period Unlimited

Reviews from Early Learners
5.0
SEOYEON_KIM
First of all, the voice is good and the explanation is good. Haha It's not hard to follow. Since it's done through a war game, it's less burdensome and the decisive thing is fun.
5.0
rini9
It was a good lecture.
5.0
whopdo
I heard it well
Mainly the ability and intuition for discovering system-related vulnerabilities.
Computer science knowledge related to each challenge.
Hacking as a hobby, hobbyist hacking.
※ "Hacking as a Hobby" content aims only for legal hacking to contribute to a safe information security ecosystem.
< To view the course content as a book: Paperback/E-book (Link) >
Here, we will master the famous wargame, Nebula. Based on fully translated Korean materials, we will practice every challenge from start to finish.
We will discover and attack vulnerabilities that can occur in Linux systems, which are widely used as servers, to escalate privileges step-by-step. Through this, you will realize that most vulnerabilities are caused by mistakes made by developers who are unaware of security. You will witness programs that become adversaries to each other due to race conditions. You will witness how clumsy data filtering becomes the beginning of program collapse. You will witness outsider interference occurring due to the misuse and abuse of special privileges. You will also witness specific functions being swapped for other functions due to poorly applied security knowledge.
By experiencing various situations, you will learn how to discover and remediate system-related security vulnerabilities. More specifically, it includes theory and practice on vulnerabilities related to privilege (general/special) settings, relative paths, environment variables, input filtering, schedulers, password hashes, code injection, plaintext communication, outdated open source, race conditions, variable initialization, library hooking, data encryption, file attributes, deserialization, privilege checking methods, and exception handling.


[Q1] I haven't taken "Hacking as a Hobby #1~3." Is it okay to start with this one?
[Ans] It shouldn't be a problem as long as you have at least basic Linux system skills (connecting, compiling, navigating, text editing, etc.). If not, I recommend studying those separately or completing "Hacking as a Hobby #1," which is the most relevant course.
[Q2] What skills will I have after completing the course?
[Ans] You will learn how to exploit various vulnerabilities that can occur in a Linux environment. You will be able to use more advanced skills regarding the vulnerabilities mentioned above. You can also use this knowledge to create more secure programs. Additionally, since it includes a lot of source code analysis, it will be helpful for future challenges in the field of reversing.
Who is this course right for?
Those who want to complete all the content of the Nebula wargame.
Those who want to learn hacking little by little as an academic hobby.
Those who wish to participate in domestic or international hacking competitions in the future.
Students in related departments who need to supplement their major knowledge.
Those who are aspiring to a career in information security.
Need to know before starting?
Experience in writing C programs can be helpful.
11,993
Learners
1,030
Reviews
118
Answers
4.7
Rating
9
Courses
ㆍ Information Security Engineer
ㆍ Author of "Coding Everybody! Python"
ㆍ Author of "Hacking as a Hobby #N" (Book & Lectures)
ㆍ Information Security Officer at Hankuk University of Foreign Studies
ㆍ CERT Team Leader at Missile Strategy Command (Army OCS #59)
ㆍ B.S. in Computer Science and Engineering, Tech University of Korea (4.42 GPA)
All
37 lectures ∙ (6hr 16min)
1. 1. Prologue
01:38
4. 4. level00
14:59
5. 5. level01
21:18
6. 6. level02
12:50
7. 7. level03
11:27
8. 8. level04
14:30
9. 9. level05
07:52
10. 10. level06
06:44
11. 11. level07
16:37
12. 12. level08
13:23
13. 13. level09(1)
12:11
14. 14. level09(2)
10:24
15. 15. level10
15:50
16. 16. level11(1)
10:30
17. 17. level11(2)
10:49
18. 18. level11(3)
08:16
19. 19. level11(4)
11:14
20. 20. level12
11:12
21. 21. level13
09:16
22. 22. level14
11:01
23. 23. level15(1)
09:39
24. 24. level15(2)
08:26
25. 25. level16(1)
11:36
26. 26. level16(2)
09:26
27. 27. level17(1)
07:47
28. 28. level17(2)
10:24
29. 29. level18(1)
09:10
30. 30. level18(2)
09:09
31. 31. level18(3)
10:33
32. 32. level18(4)
15:08
33. 33. level18(5)
06:42
34. 34. level18(6)
07:11
35. 35. level19(1)
07:57
36. 36. level19(2)
11:35
37. 37. Epilogue
01:47
All
19 reviews
4.9
19 reviews
Reviews 5
∙
Average Rating 5.0
Reviews 3
∙
Average Rating 3.7
Reviews 6
∙
Average Rating 5.0
Reviews 1
∙
Average Rating 5.0
Reviews 5
∙
Average Rating 4.8
Check out other courses by the instructor!
Explore other courses in the same field!
$26.40