강의

멘토링

커뮤니티

Security & Network

/

Computer Security

Introduction to System Hacking (Pwnable) for Competing in Hacking Competitions (CTF)

This is a course for beginners in system hacking (Pwnable) for hacking competitions (CTF).

(4.8) 69 reviews

2,025 learners

Level Basic

Course period Unlimited

  • juntheworld
System Hacking
System Hacking
Penetration Testing
Penetration Testing
buffer-overflow
buffer-overflow
System Hacking
System Hacking
Penetration Testing
Penetration Testing
buffer-overflow
buffer-overflow
Thumbnail

Reviews from Early Learners

Reviews from Early Learners

4.8

5.0

정현화

100% enrolled

It was great to learn about system hacking. Thanks for the lecture!

5.0

Mi ni

100% enrolled

I liked that it explained everything step by step from the basics!

5.0

jfp2022

100% enrolled

Thank you for helping me understand the basic concepts of computer and bof, the basics of system hacking~

What you will gain after the course

  • Participating in Hacking Competitions (CTF)

  • System Hacking (Pwnable) Basics

  • C Language and Computer Fundamentals for Hackers

We'll drastically lower the sky-high barrier to entry for hacking!

Is this your first time competing in a hacking competition (CTF)?

Understanding and solving one vulnerability theory(Buffer OverFlow) and basic problems "perfectly"

Comprehensive summary of all the knowledge needed to solve system hacking(Pwnable) problems that appear in hacking competitions (CTF)

Understanding the problem scenarios in hacking competitions (CTF) and the problems that need to be solved

Through our own operated Wargame site,
you can practice 24/7 in an environment identical to actual hacking competitions.

Free scripts & blog posts provided ✅

We provide scripts and blog posts containing all the lecture content.

  • Free eBook: Link
  • Free Course Materials: Download from the first lecture materials (pdf)
  • Free Script: Check lecture notes for every class

No need to worry about taking notes—just relax and focus on the class and hands-on practice.


We solve just one problem, but perfectly.

I know well those who have the romance and dreams of becoming a hacker but have been frustrated by the high entry barrier. The characteristic of this course is to enable even those who are completely new to hacking to experience and solve every step of the problem on their own.

Aspiring hackers who want to try their first hacking competition (CTF)

Those who want to learn about system hacking(Pwnable) and exploitation(Exploitation)

Those who are interested in security but have struggled with the high entry barrier

'You only solve one problem?'

Yes. We solve just one problem. Being able to solve one problem means you can solve dozens or hundreds of related problems. Since hacking problems aren't simple memorization exercises, thoroughly internalizing even a single problem is the right approach.

'Solve it perfectly?'

Instead of solving just one problem, we cover all the knowledge needed to solve hacking problems, including C language, computer architecture, vulnerability theory, and exploit code writing. This helps you fully internalize the related knowledge and provides a solid foundation for learning advanced content later on.

💡 This is not a lecture for geniuses, but a class that lowers the entry barrier for those interested in security.


Check out
what you'll learn.

Analyze programs using Linux's dynamic debugger (GDB).

Analyze in detail the vulnerabilities embedded in the program being analyzed.

Learn computer architecture to understand the principles of vulnerabilities and attack techniques.

So, in this course!

  • ✅ Solve Capture The Flag (CTF) system hacking (Pwnable) challenges.
  • ✅ Acquire foundational knowledge for learning memory protection techniques and advanced hacking attack methods.

I notice that the `` tags are empty - there is no Korean text between them to translate. The surrounding context shows: - **Before**: Text about CTF hacking competitions and system hacking (Pwnable) problem-solving, and learning memory protection techniques - **After**: Text about KITRI BoB certification, KAIST graduate program, and university graduation However, since there is no actual content between the `` tags to translate, I cannot provide a translation. Please provide the Korean text you'd like me to translate.

• Completed KITRI BoB(Best Of the Best) Vulnerability Analysis Track
• Master's Program at Korea Advanced Institute of Science and Technology (KAIST) Graduate School of Information Security
• Graduated from Chung-Ang University, Department of Industrial Security


Q&A 💬

Q. Do I need to know C language to do hacking?

Yes. However, this course does not directly involve using C language. We cover basic C language content enough to analyze the source code of the programs used in practice, so don't worry too much.

Q. Is there any knowledge I need to have before taking the course?

This course aims to help you acquire the perfect foundational knowledge for more advanced hacking studies. This is a course prepared for those who have never studied hacking or C language even once.

For those studying hacking for the first time, we'll go through every step from booting up your computer to solving actual hacking problems on Wargame sites, so you can relax and just focus on the lectures.

Q. The environment setup is taking too long and is too difficult. I haven't even started anything yet, so I guess I don't have the talent for this.

Absolutely not. What do you mean you haven't started anything? Configuration is very important knowledge for system hacking. In fact, in hacking, especially system hacking, building the execution environment for your target attack program (binary) is very important.

In major domestic and international hacking competitions, you need to spend 40-50% or more of your problem-solving time on environment configuration through VM (Virtual Machine) or Docker for precise attacks, making environment setup a process and knowledge that you must go through and become familiar with for system hacking.

📢 Please check before enrolling

  • The course uses the Ubuntu 22.04 LTS operating system.
  • VMware, pwntools, and other hacking tools will be used, and for hands-on practice, a PC with at least 8GB of RAM and sufficient disk space is required.
  • VMware installation and virtual environment setup are required in advance. (Installation Guide)
  • You can take this course even without knowledge of C language syntax, but it will be somewhat easier if you know it.
  • Lecture scripts and free blog posts are provided for each class, so you can focus solely on the lecture without taking separate notes.

Recommended for
these people

Who is this course right for?

  • A budding hacker who wants to try their first hacking competition (CTF)

  • Someone who is interested in security but struggled with the high barrier to entry

  • People who want to learn about system hacking (Pwnable) and exploitation (attacks)

Need to know before starting?

  • VMware installation and virtual environment setup are required in advance.

Hello
This is

2,025

Learners

69

Reviews

14

Answers

4.8

Rating

1

Course

Hello! Juntheworld

Curriculum

All

14 lectures ∙ (42min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

All

69 reviews

4.8

69 reviews

  • a05034182335님의 프로필 이미지
    a05034182335

    Reviews 3

    Average Rating 5.0

    5

    100% enrolled

    • glows235005님의 프로필 이미지
      glows235005

      Reviews 2

      Average Rating 5.0

      5

      100% enrolled

      • hhjung94020님의 프로필 이미지
        hhjung94020

        Reviews 9

        Average Rating 5.0

        5

        100% enrolled

        It was great to learn about system hacking. Thanks for the lecture!

        • sos62021382님의 프로필 이미지
          sos62021382

          Reviews 1

          Average Rating 5.0

          5

          100% enrolled

          • choisw1032님의 프로필 이미지
            choisw1032

            Reviews 3

            Average Rating 5.0

            5

            36% enrolled

            Free

            Similar courses

            Explore other courses in the same field!