Division Zero (Div0). Copyright © 2011-2018

All rights reserved.


GCC 2018 (v1.0) in South Korea, Seoul

Host Country: South Korea

Date: 21-25 Jan 2019

Camp Site: KITRI BoB Center, D-Polis Knowledge Industry Center, Building A, Daesung, Gasan-dong, Geumcheon-gu, Seoul

Accommodation: Gold River Hotel, 547-63 Gansan-dong, Geumcheon-gu, Seoul (Opposite the Camp Site)


Students will be awarded a "Certificate of Graduation" and enrolled to the GCC Alumni Network.


Training 1: Look at the Hacking (Offensive Security) Big Picture

by Kyounggon (KG) Kim


In the past, hacking was done mainly due to curiosity. Recently, however, there are more nation-state incidents. Hacking, in such cases, are done for the purpose of acquiring vital information, or violating important security elements e.g. tampering of information or paralysing services. If you look at hacking from an information acquisition point of view, you need to have a deep understanding of various security domains e.g. encryption, networks, systems, web, malware, mobile, wireless networks, Internet of Things (IoT), cyber-physical systems (CPS), etc. In this course, we will look at the whole picture of hacking and learn more about web hacking in detail. In addition, the course will cover penetration testing and cybersecurity consulting based on notes and experiences from the field.



  • Hacking Big Picture

    • Domains of hacking element

    • Level of hacking

  • Web Hacking Hands-On Practice

    • Basic knowledge of web and the Internet

    • Web hacking techniques

  • Practice Web Hacking Wargame

  • Penetration Testing and Cybersecurity Consulting

    • The goal and methodology of penetration testing

    • Case study of penetration testing

    • The objective and category of cybersecurity consulting

Training 2: Binary Exploitation

by Angelboy


This course will start with the basic knowledge of binary exploitation and introduction of vulnerabilities that are common in C/C++. Students will then learn how to exploit vulnerabilities discovered.



  • Basic Knowledge

  • Stack Overflow

  • Return Oriented Programming (ROP)

  • Format String Attack

Training 3: Applied Cybersecurity (Cybersecurity Product Development)

by Emil Tan


This course aims to introduce students to:

  • How cybersecurity services are provided;

  • How tools and solutions are operationalised in the industry; and

  • How to apply their cybersecurity knowledge to provide cutting edge cybersecurity services and develop cybersecurity tools and solutions to improve the cybersecurity of the global cyberspace.



  • Overview of the Cybersecurity Industry

  • Applied Cybersecurity Use Case(s)

  • Building a Cybersecurity Analytics Platform

  • Applied Cybersecurity Clinic

Training 4: Hunt for Attackers with Incident Response

by Hiroshi Suzuki & Hisao Nashiwa


  • Students will learn comprehensive techniques e.g. incident response, digital forensics and malware analysis.

  • Students will perform incident response against a fictional targeted attack scenario.

  • Students will analyse disk images that will be provided and unravel when and how the attackers performed the attack and stolen information. 


  • Introduction

    • Grouping Students into Team

    • Group Introductions

    • System Environment Check

  • Basic Knowledge of Computer Forensics

    • Auto-start locations (autoruns, WMI, Task Scheduler)

    • Program execution artefacts (Prefetch, ShimCache)

    • Registry (KHCU, HKLM)

    • VSS

    • Event Logs (Security, Systems, etc.)

  • CTF-Style Challenge

    • Fictional case description

    • Challenge

  • Presentation of the Fictional Incident Investigation