Are you new to studying cybersecurity?

Feeling overwhelmed about where to start? Don’t worry—we’ll guide you step by step, starting with the basics.
Beginner-Friendly Lectures With a variety of Dreamhack lectures, you can easily and quickly learn complex and tedious foundational knowledge. Start your journey with Dream Beginners! Start Learning with Dream Beginners
Wargame Challenges to Sharpen Your Skills From challenges crafted by top-performing whitehat hackers to user-created challenges, a wide variety of challenges await you! Start with beginner-level challenges first. Discover Beginner-level Challenges
The Largest Cybersecurity Community in Korea Dreamhack hosts the largest cybersecurity community in Korea. Share and discuss diverse information with others through our community! Explore the Community

New Roadmaps

Explore various roadmaps designed for the latest trends!

Various Learning Categories

You can learn a wide range of cybersecurity fields in a well-balanced way.
Beginners
System Hacking
Reverse Engineering
Web Hacking
Cryptography
Mobile Hacking
Cloud
Blockchain
Secure Coding
Hardware
Digital Forensics
Interested in more lectures? You can check it out here!

Experience Capture The Flag Firsthand

If you've become familiar with lectures and wargame challenges, try experiencing real-world scenarios with Capture The Flag (CTF).

Community

Check out the most popular posts on Dreamhack!

Questions Everyone Wants to Learn From

These are questions that many users have checked. Do you have similar questions in mind?
What do al and ah mean? When rax = 0x0123456789abcdef, what is the value of al? Does AL just mean behind? When rax = 0x0123456789abcdef, what is the value of ah? What does ah mean? Why is CD the correct answer? When rax = 0x0123456789abcdef, what is the value of eax? EAX's answer is 89abce
https://dreamhack.io/learn/119#7 In this lesson, I understood the exploit design of leaking the library address through a custom function and generating uaf from Robot or Human to run one_gadget, but it seems that the content about library leakage through custom functions is too poor. In this lecture, it's simply “libc
The problem was solved. However, when doing got overwrite, I initially tried to overwrite the got of printf or read, but it didn't work, and I solved it by overwriting got from another function. However, when I overwrite got in printf and read, I'm not sure why it doesn't work, and I want experts to help me with the reason. hehe
Dreamhack,
The Hackers' Playground
Dreamhack is a hackers' playground for
students who want to learn about hacking and cybersecurity,
developers aiming to write secure code,
and security professionals looking to upgrade their knowledge and skills.
Here, you can study, practice, share knowledge,
and improve your expertise together.

Dreamhack Offers a Variety of Services

We collaborate with various organizations, including companies, public institutions, and educational institutions.
Security Capability Improvement Solutions for Enterprises Dreamhack Enterprise
Enterprise security is no longer the sole responsibility of experts or security teams. Dreamhack Enterprise offers company-wide security enhancement solutions through lectures, wargame challenges, and CTFs.
Learn More
Cybersecurity Education Solutions for Educational Organizations Dreamhack Education
The lack of high-quality security training has been a limitation of traditional cybersecurity education. Dreamhack Education provides high-quality lectures created by experts, focusing on practical and industry-relevant content.
Get the Education Brochure
Assess Applicants' Skills Before Hiring Dreamhack Hiring CTF
Dreamhack Hiring CTF allows you to objectively evaluate the cybersecurity skills of job applicants through CTF challenges designed by white-hat hackers who have won multiple international competitions.
Get the Hiring CTF Brochure