System Hacking
10.0
(6)
Tier 1 Easy Skill Path System Hacking
Learn fundamental memory corruption vulnerabilities in system hacking. Completing this Path will give you the foundational skills for understanding vulnerabilities, as well as analyzing and exploiting vulnerabilites targeting binaries.
System Hacking
10.0
(6)
Tier 1 Easy Skill Path System Hacking
Learn fundamental memory corruption vulnerabilities in system hacking. Completing this Path will give you the foundational skills for understanding vulnerabilities, as well as analyzing and exploiting vulnerabilites targeting binaries.
0% Completed Total 0 completed
Lecture 0 /49
Excluded
49
Wargame 0 /26
26
Quiz 0 /17
17
You can access locked objectives by upgrading your plan or purchasing the units separately.
The Lab is a practice and is not included in the overall progress.

Why It's Worth Your Time

System security can feel overwhelming at first, but with a step-by-step approach, it becomes a highly rewarding field to explore. This Path is designed to help learners interested in system hacking build their skills gradually, starting from fundamental vulnerabilities like stack buffer overflows. By practicing, thinking critically, and solving problems along the way, you'll naturally develop a strong understanding of core concepts and principles of system security. This Path will equip you with both solid foundations and practical skills in system hacking. This Path is explained based on the x86-64 architecture of the Ubuntu 22.04/18.04 Linux operating system.

Topics Covered

  • Setting up and using real Linux environments with virtual machines and WSL
  • Deep understanding of computer architecture and memory structures: x86 assembly, memory layout, and calling conventions
  • Vulnerability analysis and exploitation using gdb and pwntools
  • Hands-on exercises with key memory vulnerabilities: Stack Buffer Overflow, Format String Bug, Use-After-Free, Double Free
  • Analysis and bypassing of security mitigations: NX, ASLR, PIE, RELRO
  • Logical vulnerability analysis such as command injection, path traversal, and type errors

Recommended For

  • Those who want a clear understanding of system hacking and security principles
  • Aspiring CTF participants who want to build real-world exploitation skills
  • Future white-hat hackers, security engineers, or vulnerability analysts

Prerequisite Knowledge

  • Basic computer skills
  • Basic understanding of computer components and how computers work
  • Programming experience with C or C++
Unit Composition
Total 19 units
  1. 1
    9.7
    (891)
    9.7
    (891)
    Learn how to set up a Linux environment on Apple Silicon Mac and Windows.
    Environment Setup for Linux
    Environment Setup for Linux
  2. 2
    9.6
    (592)
    9.6
    (592)
    Explore computer architecture and x86-64 ISA fundamentals.
    Computer Architecture Basics
    Background: Computer Architecture
    Quiz: Computer Architecture
  3. 3
    9.8
    (347)
    9.8
    (347)
    Learn about the memory structure of Linux processes.
    Linux Memory Layout
    Background: Linux Memory Layout
    Quiz: Linux Memory Layout
  4. 4
    9.7
    (277)
    9.7
    (277)
    Learn the fundamentals of assembly language for the x86-64 architecture.
    x86 Assembly
    x86 Assembly🤖: Essential Part(1)
    x86 Assembly🤖: Essential Part(2)
    Quiz: x86 Assembly 1
    Quiz: x86 Assembly 2
    Quiz: x86 Assembly 3
  5. 5
    9.9
    (151)
    9.9
    (151)
    Explore the use of GDB and pwndbg for debugging in Linux environments.
    GDB Installation
    GDB
    Free Trial
    Lab: GDB - Guess Value
    Quiz: GDB
    [Exercise] GDB
    Exercise: GDB
    Exercise: GDB
  6. 6
    9.9
    (121)
    9.9
    (121)
    Learn how to use pwntools, a versatile tool widely used across various security fields.
    pwntools Basics
    Pwntools Basics
    Quiz: pwntools
    [Exercise] pwntools 1
    Exercise: Pwntools 1
    addition-quiz
    [Exercise] pwntools 2
    Exercise: Pwntools 2
    flag-shop
  7. 7
    9.9
    (99)
    9.9
    (99)
    Learn about shellcode used in system hacking and how to write your own.
    Shellcode
    Exploit Tech: Shellcode
    Quiz: Shellcode
    [Exercise] shell_basic
    Exercise: shell_basic
    shell_basic
  8. 8
    9.7
    (126)
    9.7
    (126)
    Understanding calling conventions.
    Background: Calling Convention
    Background: Calling Convention
    Quiz: Calling Convention
  9. 9
    9.9
    (77)
    9.9
    (77)
    Explore stack buffer overflow vulnerabilities.
    Stack Buffer Overflow
    Memory Corruption: Stack Buffer Overflow
    Lab: Stack Buffer Overflow - Auth Overwrite
    Pro
    Lab: Stack Buffer Overflow - Memory Leak
    Pro
    Lab: Stack Buffer Overflow - Change Control Flow
    Pro
    [Exercise] Stack Buffer Overflow
    Exploit Tech: Return Address Overwrite
    Return Address Overwrite
    [Exercise] Stack Buffer Overflow - 2
    Exercise: basic_exploitation_001
    Exercise: basic_exploitation_000
    basic_exploitation_000
    basic_exploitation_001
  10. 10
    9.9
    (58)
    100 Coin
    9.9
    (58)
    100 Coin
    Explore stack buffer overflow attacks, stack canaries, and techniques to bypass them.
    Stack Canary
    Mitigation: Stack Canary
    Lab: Stack Canary
    Pro
    Quiz: Stack Canary
    [Exercise] Stack Canary
    Exploit Tech: Return to Shellcode
    Exercise: ssp_001
    Return to Shellcode
    ssp_001
  11. 11
    9.9
    (47)
    200 Coin
    9.9
    (47)
    200 Coin
    Understand how NX and ASLR work as mitigation techniques, and explore ROP (Return-Oriented Programming) as a method to bypass them.
    NX & ASLR
    Mitigation: NX & ASLR
    Static Link vs. Dynamic Link
    Background: Library - Static Link vs. Dynamic Link
    Quiz: Static Link vs. Dynamic Link
    [Exercise] Return to Library
    Exploit Tech: Return to Library
    Return to Library
    [Exercise] Return Oriented Programming
    Exploit Tech: Return Oriented Programming
    rop
    [Exercise] Return Oriented Programming - 2
    Exploit Tech: ROP x86
    Exploit Tech: ROP x64
    basic_rop_x64
    basic_rop_x86
  12. 12
    9.9
    (35)
    150 Coin
    9.9
    (35)
    150 Coin
    Learn how PIE and RELRO function as mitigation mechanisms, and explore bypass techniques using hook overwriting and One Gadget exploitation.
    PIE
    Background: PIE
    Quiz: PIE
    RELRO
    Background: RELRO
    Quiz: RELRO
    [Exercise] Hook Overwrite
    Exploit Tech: Hook Overwrite
    fho
    [Exercise] Hook Overwrite - 2
    Exercise: hook
    Exercise: oneshot
    oneshot
    hook
  13. 13
    9.8
    (34)
    50 Coin
    9.8
    (34)
    50 Coin
    Understand Out-of-Bounds (OOB) vulnerabilities caused by out-of-range array access and learn how they can be exploited.
    Out of bounds
    Memory Corruption: Out of Bounds
    Quiz: Out of Bounds
    [Exercise] Out of Bounds
    Exploit Tech: Out of bounds
    out_of_bound
  14. 14
    9.9
    (34)
    50 Coin
    9.9
    (34)
    50 Coin
    Explore command injection vulnerabilities and how to prevent them.
    Command Injection - C Langauge
    Logical Bug: Command Injection
    [Exercise] Command Injection
    Exploit Tech: Command Injection
    cmd_center
  15. 15
    9.7
    (42)
    50 Coin
    9.7
    (42)
    50 Coin
    Explore Linux file system path concepts and path traversal vulnerabilities.
    Path Traversal - C Language
    Logical Bug: Path Traversal
  16. 16
    9.9
    (27)
    50 Coin
    9.9
    (27)
    50 Coin
    Learn the importance of data types in C and how improper usage can lead to security vulnerabilities.
    Type Error
    Logical Bug: Type Error
    [Exercise] Type Error
    Exploit Tech: Type Error
    sint
  17. 17
    9.3
    (30)
    50 Coin
    9.3
    (30)
    50 Coin
    Explore how ptmalloc2 manages memory, then learn about the Use-After-Free vulnerability and how to exploit it.
    ptmalloc2
    Background: ptmalloc2
    Quiz: ptmalloc2
    Use-After-Free
    Memory Corruption: Use After Free
    [Exercise] Use-After-Free
    Exploit Tech: Use After Free
    uaf_overwrite
  18. 18
    9.7
    (19)
    150 Coin
    9.7
    (19)
    150 Coin
    Explore double free bug and tcache poisoning techniques in heap exploitation.
    Double Free Bug
    Memory Corruption: Double Free Bug
    Lab: Double Free Bug - Tcache
    Pro
    Quiz: Double Free Bug
    [Exercise] Double Free Bug
    Exploit Tech: Tcache Poisoning
    Tcache Poisoning
    [Exercise] Double Free Bug - 2
    Exercise: tcache_dup
    Exercise: tcache_dup2
    tcache_dup2
    tcache_dup
  19. 19
    10.0
    (14)
    100 Coin
    10.0
    (14)
    100 Coin
    Explore format string bugs, their exploitation, and practical exercises.
    Format String Bug
    Memory Corruption: Format String Bug
    Lab: Format String Bug - Memory Read
    Pro
    Lab: Format String Bug - Memory Write
    Pro
    Quiz: Format String Bug
    [Exercise] Format String Bug
    Exploit Tech: Format String Bug
    Format String Bug
    [Exercise] Format String Bug - 2
    Exercise: basic_exploitation_002
    Exercise: basic_exploitation_003
    basic_exploitation_002
    basic_exploitation_003
Reviews
10.0 (6)
27 days ago

장점 1. 프로그램 작동방식을 직관적으로 배울 수 있음. 대학교에서 스택,힙,데이터,코드영역을 알려주긴 함. 근데 스택 영역이 자료구조 스택처럼 함수 호출 될 때 공간을 더 쓰고 리턴할 때 공간을 해제한다고만 배움. 드림핵에서 어셈블리, 취약점들을 배우면서 프로그램 작동방식을 직관적으로 알게 됨. 2. 컴구,운체 할 때 도움될거 같음. (글자수 부족으로 운체는 후기 X) 컴퓨터 구조를 혼자 독학해본 적이 있었음. 컴퓨터 구조 및 설계(RISC-V)이었는데 그때 배울 때는 책의 40~50퍼 정도만 이해한거 같은데 공부하고 다시 보니 파이프라이닝, 전방전달 같은 전에 추상적으로만 이해 했던게 이해 가서 재밌었음. (사실 회로 설계 공부도 해서 그렇긴 함) 단점 1. 오타 있음. 2. 설명이 가끔 생략됨.

1 month ago

기초를 다지는데 도움이 됐당께

2 months ago

처음엔 용어부터 낯설어서 많이 막막했지만 강의를 보고 하나씩 따라 치고 직접 익스플로잇에 성공하니깐 재밌었다. 이런 강의가 많이 없는데 드림핵에서 배울수 있어 정말 좋았다. 시스템해킹의 기본적인 공격 기법들을 배울수 있어서 정말 좋았다.

2 months ago

모든 기법은 아니더라도, 시스템 해킹을 하기 위한 메이저한 취약점들을 대부분 다뤄서 처음 포너블 입문하기엔 매우 좋은 Path인것 같습니다

7 months ago

당연히 이 강의 만으로는 충분하진 않지만, 보안에 입문하고 포너블을 처음 시작할 때는 큰 도움이 되는 것 같습니다. 중간에 오타나, 설명이 부족한 부분이 있지만 알찬 강의였습니다.

0% Completed Total 0 completed
Lecture 0 /49
Excluded
49
Wargame 0 /26
26
Quiz 0 /17
17
You can access locked objectives by upgrading your plan or purchasing the units separately.
The Lab is a practice and is not included in the overall progress.