Are you new to Dreamhack?
Sign up and use all security-related services.
Are you new to studying security?
We've got you covered. Explore the best cybersecurity learning platform right here.Roadmaps for newbies
Are you starting to study security for the first time? You can learn easily and quickly with four different interactive elements.
Start the beginner course
Content created by practitioners
Discover content created by world champion hackers. We're bringing their tips straight to you.
Explore content
The largest cyber security community in Korea
Dreamhack has the largest community in Korea. Share various security information with the community and Discord!
Explore the community
New roadmaps
Check out our various roadmaps for the latest trends!9 different areas of study
You'll learn about all aspects of security.
Interested in more courses?
You can check it out here!
CTF to experience hacking competitions first-hand
Once you're comfortable with the courses and wargames, get hands-on with the CTF!Community
Check out the most popular posts on Dreamhack!The question everyone wants to know
These questions have been asked by many users. Do you have any that resonate with you?
What do al and ah mean?
When rax = 0x0123456789abcdef, what is the value of al?
Does AL just mean behind?
When rax = 0x0123456789abcdef, what is the value of ah?
What does ah mean? Why is CD the correct answer?
When rax = 0x0123456789abcdef, what is the value of eax?
EAX's answer is 89abce
https://dreamhack.io/learn/119#7
In this lesson, I understood the exploit design of leaking the library address through a custom function and generating uaf from Robot or Human to run one_gadget, but it seems that the content about library leakage through custom functions is too poor.
In this lecture, it's simply “libc
The problem was solved. However, when doing got overwrite, I initially tried to overwrite the got of printf or read, but it didn't work, and I solved it by overwriting got from another function. However, when I overwrite got in printf and read, I'm not sure why it doesn't work, and I want experts to help me with the reason. hehe
The hackers' playground
Dreamhack Dreamhack is a hacker's playground.
Students who want to study hacking and security,
developers who want to write more secure code,
and even security professionals
who want to take their security knowledge and skills to the next level
come together to study, practice, share knowledge, and improve their skills.
Dreamhack Dreamhack is a hacker's playground.
Students who want to study hacking and security,
developers who want to write more secure code,
and even security professionals
who want to take their security knowledge and skills to the next level
come together to study, practice, share knowledge, and improve their skills.
Dreamhack offers a variety of services.
We work with a wide range of organizations, including enterprises, public agencies, and educational institutions.
Security Capability Improvement Solutions for Enterprises
Dreamhack Enterprise
Click here for more details
Enterprise security is no longer a job for experts alone, or for security teams alone. Dreamhack Enterprise provides solutions to improve your security capabilities through curriculums.
Secure Education Solutions for Institutions
Dreamhack Education
Get the Education Brochure
The lack of security training has been cited as a limitation of existing security education. Dreamhack Education provides quality courses created by experts and centered on real-world.
Get to know your applicant's capabilities before you hire them.
Dreamhack Hiring CTF
Get the Hiring CTF Brochure
The Dreamhack Hiring CTF features CTF questions handcrafted by world champion hackers to help you more precisely judge applicant's skillsets.