Methods and senses for discovering security vulnerabilities in the web, crypto, portable, reversing, and forensic areas.
Computer science knowledge relevant to each challenge.
How to install and use security tools.
Hacking Contest Challenge with "Hacking as a Hobby" !
Hacking as a hobby, hacking as a hobby. ※ "Hacking as a Hobby" content only focuses on legal hacking to contribute to a safe information security ecosystem.
▶ Would you like to try your hand at a hacking competition by following the guide ?
▶ Want to get familiar with certain types of hackathon problems?
▶ Are you feeling uncomfortable and frustrated with hastily created Internet materials?
If so, this course will help you.
Here, we'll complete all the online challenges from SquareCTF (2017). We'll walk through each challenge from start to finish and practice.
SquareCTF is an international hacking competition hosted and organized by SQUARE. * SQUARE: PayPal's competitor. A company run by Twitter CEO Jack Dorsey.
If you complete all the course content, you will be able to solve challenges that 98% of participants fail to clear, and as your skills improve, you will be able to challenge yourself in more difficult hacking competitions in the future.
Hacking competitions cover five types of challenges: the portable area, where the goal is to infiltrate and gain system privileges ; the reversing area, where software is disassembled and modified ; the web area, where key information is stolen by bypassing a website's lax security procedures ; the crypto area, where secrets are discovered by deciphering given ciphertext; and the forensics area, where unauthorized activity is investigated based on the acquired information.
You will also modify (patch) some programs to check for special functions planted by developers, cause malfunctions by entering unexpected strings , write programs to understand encryption systems and decipher them, find rules in countless piles of data to obtain hidden data, create attack codes one by one in machine language , and restore files hidden inside by playing compressed files that have been intentionally damaged .
By practicing these various challenges, you'll learn how to discover and address vulnerabilities . Specifically, the course covers theory and practice on bugs and vulnerabilities related to IDOR, SQLI, shellcode, steganography, decryption, and Git.
To ensure effective learning, we provide a virtual image that recreates the actual competition situation . This allows you to practice as if you were participating in the competition. We also cover how to install and use tools. Tools used include Ghidra, Pwntools, QEMU, FTK Imager, Checksec, 010 Editor, Wireshark, Scapy, Zsteg, PIL, and BGB.
The lecture focuses on minimizing individual learning by discussing both phenomena and principles, but if you have any questions, please use the Q&A board on the Naver Cafe "Hacking as a Hobby (link) ".
For further details, please refer to the prologue video, which includes additional questions and answers.