Are you new to studying security?

We've got you covered. Explore the best cybersecurity learning platform right here.
Roadmaps for newbies Are you starting to study security for the first time? You can learn easily and quickly with four different interactive elements. Start the beginner course
Content created by practitioners Discover content created by world champion hackers. We're bringing their tips straight to you. Explore content
The largest cyber security community in Korea Dreamhack has the largest community in Korea. Share various security information with the community and Discord! Explore the community

New roadmaps

Check out our various roadmaps for the latest trends!

9 different areas of study

You'll learn about all aspects of security.
System Hacking
Reverse Engineering
Web Hacking
Mobile Hacking
Secure Coding
Digital Forensics
Interested in more courses? You can check it out here!

CTF to experience hacking competitions first-hand

Once you're comfortable with the courses and wargames, get hands-on with the CTF!


Check out the most popular posts on Dreamhack!

The question everyone wants to know

These questions have been asked by many users. Do you have any that resonate with you? In this lesson, I understood the exploit design of leaking the library address through a custom function and generating uaf from Robot or Human to run one_gadget, but it seems that the content about library leakage through custom functions is too poor. In this lecture, it's simply “libc
What do al and ah mean? When rax = 0x0123456789abcdef, what is the value of al? Does AL just mean behind? When rax = 0x0123456789abcdef, what is the value of ah? What does ah mean? Why is CD the correct answer? When rax = 0x0123456789abcdef, what is the value of eax? EAX's answer is 89abce
The problem was solved. However, when doing got overwrite, I initially tried to overwrite the got of printf or read, but it didn't work, and I solved it by overwriting got from another function. However, when I overwrite got in printf and read, I'm not sure why it doesn't work, and I want experts to help me with the reason. hehe
The hackers' playground
Dreamhack is a hacker's playground.
Students who want to study hacking and security,
developers who want to write more secure code,
and even security professionals
who want to take their security knowledge and skills to the next level
come together to study, practice, share knowledge, and improve their skills.

Dreamhack offers a variety of services.

We work with a wide range of organizations, including enterprises, public agencies, and educational institutions.
Security Capability Improvement Solutions for Enterprises Dreamhack Enterprise
Enterprise security is no longer a job for experts alone, or for security teams alone. Dreamhack Enterprise provides solutions to improve your security capabilities through curriculums.
Click here for more details
Secure Education Solutions for Institutions Dreamhack Education
The lack of security training has been cited as a limitation of existing security education. Dreamhack Education provides quality courses created by experts and centered on real-world.
Get the Education Brochure
Get to know your applicant's capabilities before you hire them. Dreamhack Hiring CTF
The Dreamhack Hiring CTF features CTF questions handcrafted by world champion hackers to help you more precisely judge applicant's skillsets.
Get the Hiring CTF Brochure