
Special Lecture on Information Security and Personal Information Protection
caliber50
This is a free special lecture that can help you strengthen your information security and personal information protection capabilities.
Beginner
You can clear all the challenges of the hacking competition SquareCTF (2017).
298 learners
Level Basic
Course period Unlimited
Reviews from Early Learners
5.0
secu0320
This is a course with many learning points.
5.0
sunny75
2024/10/9/Wed 17:25 I listened to the lecture well. I learned a lot while listening to the lecture. Thank you for making a good lecture.
5.0
박건우
I enjoyed the lecture. Thank you.
Methods and intuition for discovering security vulnerabilities in the fields of Web, Crypto, Pwnable, Reversing, and Forensics.
Computer science knowledge related to each challenge.
How to install and use security tools.
"Hacking as a Hobby" Hacking Competition Challenge!
Hacking as a hobby, Hobby Hacking.
※ "Hobby Hacking" content only pursues legal hacking to contribute to a safe information security ecosystem.
< To view the course content as a book: Paper book/E-book (link) >
▶ Would you like to try a hacking competition by following a guide?
▶ Do you want to get used to the consistent patterns of hacking competition problems?
▶ Have you felt uncomfortable and frustrated by poorly made internet materials?
We will complete all online challenges of SquareCTF (2017) here. We will go through and practice every challenge from start to finish.
SquareCTF is an international hacking competition hosted and organized by SQUARE.
* SQUARE: A competitor to PayPal. A company managed by Twitter CEO Jack Dorsey.
If you complete all the contents of the course, you will be able to solve challenges that 98% of participants could not clear, and as your skills improve, you will be able to challenge even more high-difficulty hacking competitions in the future.
The challenge types in hacking competitions cover five categories. They are divided into the Pwnable area, where the goal is to penetrate and seize system privileges; the Reversing area, where you disassemble and modify software at will; the Web area, where you bypass weak security procedures on websites to steal key information; the Crypto area, where you decrypt given ciphertexts to find secrets; and the Forensic area, where you investigate unauthorized activities based on acquired information.
You will get to see things like partially modifying (patching) a program to check for special features planted by developers, causing malfunctions by entering unexpected strings, understanding cryptographic systems to write programs that decrypt them, obtaining hidden data by finding patterns within massive piles of data, crafting exploit code stitch by stitch in machine language, and restoring hidden files by reconstructing intentionally corrupted archive files.
By working through these various challenge exercises, you will learn how to discover and respond to vulnerabilities. Specifically, it includes theory and practice regarding bugs and vulnerabilities related to IDOR, SQLI, shellcode, steganography, decryption, Git, and more.
For effective learning, we provide a virtual image that recreates the actual competition environment. This allows you to practice as if you were participating in the competition. Additionally, we cover tool installation and usage. The tools used include Ghidra, Pwntools, QEMU, FTK Imager, Checksec, 010 Editor, Wireshark, Scapy, Zsteg, PIL, BGB, and more.
The lectures focus on explaining both phenomena and principles to minimize the need for individual study, but if you have any questions, please feel free to use the Q&A board on the Naver Cafe "Hacking as a Hobby(Link)".
Please refer to the prologue video for other details. The video includes additional questions and their respective answers.
Who is this course right for?
Those who want to complete all the challenges of the hacking competition SquareCTF (2017).
Those who want to learn hacking little by little as an academic hobby.
Those who wish to participate in more challenging hacking competitions.
Students in related departments who need to supplement their major knowledge.
Those who are aspiring to a career in information security.
Need to know before starting?
Experience in writing C and Python programs can be helpful.
It may be helpful if you have taken Hacking as a Hobby #1–5.
12,058
Learners
1,043
Reviews
118
Answers
4.7
Rating
9
Courses
ㆍ Information Security Engineer
ㆍ Author of "Coding Everybody! Python"
ㆍ Author of "Hacking as a Hobby #N" (Book & Lectures)
ㆍ Information Security Officer at Hankuk University of Foreign Studies
ㆍ CERT Team Leader at Missile Strategy Command (Army OCS #59)
ㆍ B.S. in Computer Science and Engineering, Tech University of Korea (4.42 GPA)
All
82 lectures ∙ (12hr 5min)
1. Intro
02:32
2. Config and Lore
09:24
12. Ciphercel(1)
08:29
13. Ciphercel(2)
08:44
14. Ciphercel(3)
08:58
15. Ciphercel(4)
10:07
16. Ciphercel(5)
08:37
17. Ciphercel(6)
09:18
18. Ciphercel(7)
08:14
19. Ciphercel(8)
11:32
20. Ciphercel(9)
08:02
21. Ciphercel(10)
05:29
22. Ciphercel(11)
09:43
23. Ciphercel(12)
09:56
All
8 reviews
5.0
8 reviews
Reviews 5
∙
Average Rating 5.0
Reviews 1
∙
Average Rating 5.0
Reviews 121
∙
Average Rating 5.0
Reviews 3
∙
Average Rating 5.0
Reviews 3
∙
Average Rating 5.0
Check out other courses by the instructor!
Explore other courses in the same field!