![[에듀윌 화이트해커 양성과정] 웹 해킹 기법(기초+응용)강의 썸네일](https://cdn.inflearn.com/public/courses/330444/cover/f1e3c27c-1528-41b7-b307-ac27a997c1c8/330444-eng.png?w=420)
[에듀윌 화이트해커 양성과정] 웹 해킹 기법(기초+응용)
에듀윌학습도우미
웹해킹에 사용되는 여러가지 도구를 이용하여, 웹을 해킹하는 강의입니다. * 해킹의 목표로 하는 것들로 서로 연관있는 세 가지 공격 벡터로 웹 서버, 웹 애플리케이션, 웹 사용자를 목표로 합니다.
중급이상
모의해킹
This is an introductory lecture on system hacking (Pwnable) for hacking competitions (CTF).
1,971 learners

Participating in a hacking competition (CTF)
System Hacking (Pwnable) Basics
C Language and Computer Basics for Hackers
The high barrier to entry into hacking is greatly reduced!
Understand and solve one vulnerability theory (Buffer Overflow) and its basic problems “perfectly”
All the knowledge needed to solve system hacking (pwnable) problems presented in computer-to-computer (CTF) competitions.
Understanding the challenges and solutions of a CTF (Computer-To-Function) competition
Through our self-operated Wargame site
You can practice 24 hours a day in a real hacking competition environment .
We provide a script and blog post containing all the lecture content.
You can focus on class and practice comfortably without worrying about notes.
I know many people who harbor romantic dreams and aspirations about becoming a hacker but are frustrated by the high barriers to entry . The unique feature of this course is that it allows even complete hacking beginners to experience and solve problems on their own.
Yes. Solve just one problem. Being able to solve one problem means being able to solve dozens or hundreds of related problems. Hacking problems aren't simply memorization problems , so mastering even just one problem is the right approach.
Instead of focusing on just one problem, this course covers all the knowledge necessary to solve hacking problems, including the C language, computer architecture, vulnerability theory, and exploit code writing. This will help you fully embody relevant knowledge and provide a solid foundation for future, more advanced learning.
💡 This is not a lecture for geniuses, but a class that lowers the barrier to entry for those interested in security.
• Master's program in Information Security at the Korea Advanced Institute of Science and Technology (KAIST)
• Graduated from the Department of Industrial Security at Chung-Ang University
Q. Do I have to know C to hack?
Yes. However, this course doesn't directly use the C language. Don't worry, we cover basic C language concepts enough to allow you to analyze the source code of the programs you'll be practicing.
Q. Is there anything I need to know before attending the lecture?
This course aims to provide a thorough foundation for more in-depth hacking studies. This course is designed for those who have never studied hacking or the C language before .
For those who are new to hacking, we will walk you through the entire process from booting up your computer to solving hacking problems on an actual Wargame site, so you can focus on the lecture with an easy mind.
Q. Setting up the environment is taking too long and difficult. I can't even get started. I guess I lack talent.
Absolutely not. You haven't even started anything yet. Configuration is crucial knowledge for system hacking. In fact, in hacking, especially system hacking , setting up the execution environment for the target program (binary) is crucial .
Even in major domestic and international hacking competitions, more than 40-50% of the time spent on configuring the environment through VM (Virtual Machine) or Docker for precise attacks is spent on solving problems. Therefore, environment configuration is a process and knowledge that must be gone through and familiarized in order to hack the system.
📢 Please check before taking the class
Who is this course right for?
Aspiring hackers who want to try their hand at a hacking competition (CTF) for the first time
People who are interested in security but have difficulty due to high barriers to entry
Anyone who wants to learn about system hacking (pwnable) and exploitation (attack).
Need to know before starting?
VMware installation and virtual environment creation are required in advance.
All
14 lectures ∙ (42min)
Course Materials:
All
65 reviews
Free
Explore other courses in the same field!