강의

멘토링

로드맵

Inflearn brand logo image
Security & Network

/

Computer Security

Hacking as a hobby #6 (SquareCTF_RR)

You can clear all the challenges of the hacking competition SquareCTF (2017).

(5.0) 6 reviews

276 learners

  • caliber50
Penetration Testing
Reversing
Forensic

Reviews from Early Learners

What you will learn!

  • Methods and senses for discovering security vulnerabilities in the web, crypto, portable, reversing, and forensic areas.

  • Computer science knowledge relevant to each challenge.

  • How to install and use security tools.

Hacking Contest Challenge with "Hacking as a Hobby" !

Hacking as a hobby, hacking as a hobby.
※ "Hacking as a Hobby" content only focuses on legal hacking to contribute to a safe information security ecosystem.

< To view the course content in book form: Paper book/e-book (link) >

Hacking as a hobby #6 (SquareCTF_RR)

▶ Would you like to try your hand at a hacking competition by following the guide ?

▶ Want to get familiar with certain types of hackathon problems?

▶ Are you feeling uncomfortable and frustrated with hastily created Internet materials?

If so, this course will help you.

Here, we'll complete all the online challenges from SquareCTF (2017). We'll walk through each challenge from start to finish and practice.

SquareCTF is an international hacking competition hosted and organized by SQUARE.
* SQUARE: PayPal's competitor. A company run by Twitter CEO Jack Dorsey.

If you complete all the course content, you will be able to solve challenges that 98% of participants fail to clear, and as your skills improve, you will be able to challenge yourself in more difficult hacking competitions in the future.

Hacking competitions cover five types of challenges: the portable area, where the goal is to infiltrate and gain system privileges ; the reversing area, where software is disassembled and modified ; the web area, where key information is stolen by bypassing a website's lax security procedures ; the crypto area, where secrets are discovered by deciphering given ciphertext; and the forensics area, where unauthorized activity is investigated based on the acquired information.

You will also modify (patch) some programs to check for special functions planted by developers, cause malfunctions by entering unexpected strings , write programs to understand encryption systems and decipher them, find rules in countless piles of data to obtain hidden data, create attack codes one by one in machine language , and restore files hidden inside by playing compressed files that have been intentionally damaged .


By practicing these various challenges, you'll learn how to discover and address vulnerabilities . Specifically, the course covers theory and practice on bugs and vulnerabilities related to IDOR, SQLI, shellcode, steganography, decryption, and Git.

To ensure effective learning, we provide a virtual image that recreates the actual competition situation . This allows you to practice as if you were participating in the competition. We also cover how to install and use tools. Tools used include Ghidra, Pwntools, QEMU, FTK Imager, Checksec, 010 Editor, Wireshark, Scapy, Zsteg, PIL, and BGB.

The lecture focuses on minimizing individual learning by discussing both phenomena and principles, but if you have any questions, please use the Q&A board on the Naver Cafe "Hacking as a Hobby (link) ".

For further details, please refer to the prologue video, which includes additional questions and answers.

Note

Recommended for
these people

Who is this course right for?

  • Anyone who wants to complete all the challenges of the hacking competition SquareCTF (2017).

  • Anyone who wants to learn hacking little by little as an academic hobby.

  • Anyone who wants to participate in more difficult hacking competitions.

  • Students in related departments who need to supplement their major knowledge.

  • Those who wish to pursue a career in information security.

Need to know before starting?

  • If you have experience writing C or Python programs, it may be helpful.

  • If you have taken Hacking as a hobby #1-5, this may be helpful.

Hello
This is

11,405

Learners

914

Reviews

118

Answers

4.7

Rating

9

Courses

ㆍ 정보보안기사
ㆍ "생활코딩! 파이썬" 도서 저자
ㆍ "취미로 해킹#N" 도서(+강의) 저자
ㆍ 한국외국어대학교 정보보안 담당 직원
ㆍ 미사일전략사령부 CERT 팀장(육군 학사#59)
ㆍ 한국공학대학교 컴퓨터공학 학사(4.42)

Curriculum

All

82 lectures ∙ (12hr 5min)

Published: 
Last updated: 

Reviews

All

6 reviews

5.0

6 reviews

  • cp96171938님의 프로필 이미지
    cp96171938

    Reviews 3

    Average Rating 5.0

    5

    100% enrolled

    • aceoftop1975님의 프로필 이미지
      aceoftop1975

      Reviews 95

      Average Rating 5.0

      5

      100% enrolled

      2024/10/9/Wed 17:25 I listened to the lecture well. I learned a lot while listening to the lecture. Thank you for making a good lecture.

      • dnlstm41147955님의 프로필 이미지
        dnlstm41147955

        Reviews 2

        Average Rating 5.0

        5

        100% enrolled

        I enjoyed the lecture. Thank you.

        • kjy85854177님의 프로필 이미지
          kjy85854177

          Reviews 3

          Average Rating 5.0

          5

          100% enrolled

          It's an easy and comfortable lecture.

          • onchaintracer7665님의 프로필 이미지
            onchaintracer7665

            Reviews 1

            Average Rating 5.0

            5

            6% enrolled

            Now just trust and see.

            $42.90

            caliber50's other courses

            Check out other courses by the instructor!

            Similar courses

            Explore other courses in the same field!