Is this your first visit to Dreamhack?
Sign up now and access all security-related services in Dreamhack.
Are you new to studying cybersecurity?
Feeling overwhelmed about where to start? Don’t worry—we’ll guide you step by step, starting with the basics.Beginner-Friendly Lectures
With a variety of Dreamhack lectures, you can easily and quickly learn complex and tedious foundational knowledge. Start your journey with Dream Beginners!
Start Learning with Dream Beginners
Wargame Challenges to Sharpen Your Skills
From challenges crafted by top-performing whitehat hackers to user-created challenges, a wide variety of challenges await you! Start with beginner-level challenges first.
Discover Beginner-level Challenges
The Largest Cybersecurity Community in Korea
Dreamhack hosts the largest cybersecurity community in Korea. Share and discuss diverse information with others through our community!
Explore the Community
New Roadmaps
Explore various roadmaps designed for the latest trends!Various Learning Categories
You can learn a wide range of cybersecurity fields in a well-balanced way.
Interested in more lectures?
You can check it out here!
Experience Capture The Flag Firsthand
If you've become familiar with lectures and wargame challenges, try experiencing real-world scenarios with Capture The Flag (CTF).Community
Check out the most popular posts on Dreamhack!Questions Everyone Wants to Learn From
These are questions that many users have checked. Do you have similar questions in mind?
What do al and ah mean?
When rax = 0x0123456789abcdef, what is the value of al?
Does AL just mean behind?
When rax = 0x0123456789abcdef, what is the value of ah?
What does ah mean? Why is CD the correct answer?
When rax = 0x0123456789abcdef, what is the value of eax?
EAX's answer is 89abce
https://dreamhack.io/learn/119#7
In this lesson, I understood the exploit design of leaking the library address through a custom function and generating uaf from Robot or Human to run one_gadget, but it seems that the content about library leakage through custom functions is too poor.
In this lecture, it's simply “libc
The problem was solved. However, when doing got overwrite, I initially tried to overwrite the got of printf or read, but it didn't work, and I solved it by overwriting got from another function. However, when I overwrite got in printf and read, I'm not sure why it doesn't work, and I want experts to help me with the reason. hehe
Dreamhack,
The Hackers' Playground Dreamhack is a hackers' playground for
students who want to learn about hacking and cybersecurity,
developers aiming to write secure code,
and security professionals looking to upgrade their knowledge and skills.
Here, you can study, practice, share knowledge,
and improve your expertise together.
The Hackers' Playground Dreamhack is a hackers' playground for
students who want to learn about hacking and cybersecurity,
developers aiming to write secure code,
and security professionals looking to upgrade their knowledge and skills.
Here, you can study, practice, share knowledge,
and improve your expertise together.
Dreamhack Offers a Variety of Services
We collaborate with various organizations, including companies, public institutions, and educational institutions.
Security Capability Improvement Solutions for Enterprises
Dreamhack Enterprise
Learn More
Enterprise security is no longer the sole responsibility of experts or security teams. Dreamhack Enterprise offers company-wide security enhancement solutions through lectures, wargame challenges, and CTFs.
Cybersecurity Education Solutions for Educational Organizations
Dreamhack Education
Get the Education Brochure
The lack of high-quality security training has been a limitation of traditional cybersecurity education. Dreamhack Education provides high-quality lectures created by experts, focusing on practical and industry-relevant content.
Assess Applicants' Skills Before Hiring
Dreamhack Hiring CTF
Get the Hiring CTF Brochure
Dreamhack Hiring CTF allows you to objectively evaluate the cybersecurity skills of job applicants through CTF challenges designed by white-hat hackers who have won multiple international competitions.