Web Hacking
Introduction of Webhacking
https://dreamhack.io/lecture/courses/6
Client-side Basic
https://dreamhack.io/lecture/courses/7
Server-side Basic
https://dreamhack.io/lecture/courses/15
Client-side Advanced
https://dreamhack.io/lecture/courses/18
Server-side Advanced - SQL Injection
https://dreamhack.io/lecture/courses/27
Server-side Advanced - NoSQL
https://dreamhack.io/lecture/courses/29
Server-side Advanced - Command Injection
https://dreamhack.io/lecture/courses/28
Server-side Advanced - File Vulnerability
https://dreamhack.io/lecture/courses/33
System Exploitation Fundamental
시스템 해킹 기초
https://dreamhack.io/lecture/courses/13
Memory Corruption - C (I)
https://dreamhack.io/lecture/courses/14
Memory Corruption - C (II)
https://dreamhack.io/lecture/courses/12
Memory Corruption - C++
https://dreamhack.io/lecture/courses/26
Logical Bugs
https://dreamhack.io/lecture/courses/1
Linux Exploitation & Mitigation Part 1
https://dreamhack.io/lecture/courses/2
Linux Exploitation & Mitigation Part 2
https://dreamhack.io/lecture/courses/3
Linux Exploitation & Mitigation Part 3
https://dreamhack.io/lecture/courses/4
Tools
https://dreamhack.io/lecture/courses/5
Advanced Linux Exploitation
https://dreamhack.io/lecture/courses/11
Heap Allocator Exploit
https://dreamhack.io/lecture/courses/16
Heap Allocator Exploit - 2
https://dreamhack.io/lecture/courses/34
Reverse Engineering
리버스 엔지니어링이란
https://dreamhack.io/lecture/courses/19
x64 기초
https://dreamhack.io/lecture/courses/20
puts("hello world!\n"); → x86_64 asm
https://dreamhack.io/lecture/courses/21
x64dbg 사용법
https://dreamhack.io/lecture/courses/22
hello-world.exe로 배우는 x64dbg 사용법
https://dreamhack.io/lecture/courses/23
쉬운 crackme를 통한 디버거 사용법 - 1
https://dreamhack.io/lecture/courses/24
쉬운 crackme를 통한 디버거 사용법 - 2
https://dreamhack.io/lecture/courses/25
Linux Kernel Exploit
Introduction: Linux Kernel Exploit🐧
https://dreamhack.io/lecture/courses/36
Tool: QEMU
https://dreamhack.io/lecture/courses/47
Background: Kernel Debugging
https://dreamhack.io/lecture/courses/51
Background: Tasks
https://dreamhack.io/lecture/courses/56
Exploit Tech: prepare & commit
https://dreamhack.io/lecture/courses/61
Mitigation: KASLR
https://dreamhack.io/lecture/courses/65
Exploit Tech: Kernel Leak
https://dreamhack.io/lecture/courses/68
Exploit Tech: ret2usr
https://dreamhack.io/lecture/courses/82
System Hacking Fundamental V.2
Welcome Hackers👨💻
https://dreamhack.io/lecture/courses/35
Tool: Environment Setup⚙️
https://dreamhack.io/lecture/courses/44
Background: Computer Architecture
https://dreamhack.io/lecture/courses/43
Background: Linux Memory Layout
https://dreamhack.io/lecture/courses/52
x86 Assembly🤖: Essential Part(1)
https://dreamhack.io/lecture/courses/37
x86 Assembly🤖: Essential Part(2)
https://dreamhack.io/lecture/courses/63
Tool: gdb
https://dreamhack.io/lecture/courses/55
Exploit Tech: Shellcode
https://dreamhack.io/lecture/courses/50
Background: Calling Convention
https://dreamhack.io/lecture/courses/54
Memory Corruption: Stack Buffer Overflow
https://dreamhack.io/lecture/courses/60
Exploit Tech: Return Address Overwrite
https://dreamhack.io/lecture/courses/58
Tool: pwntools
https://dreamhack.io/lecture/courses/59
Mitigation: Stack Canary
https://dreamhack.io/lecture/courses/112
Exploit Tech: Return to Shellcode
https://dreamhack.io/lecture/courses/64
Mitigation: NX & ASLR
https://dreamhack.io/lecture/courses/85
Background: Library - Static Link vs. Dynamic Link
https://dreamhack.io/lecture/courses/66
Exploit Tech: Return to Library
https://dreamhack.io/lecture/courses/83
Exploit Tech: Return Oriented Programming
https://dreamhack.io/lecture/courses/84
Background: PIE
https://dreamhack.io/lecture/courses/113
Memory Corruption: Out of Bounds
https://dreamhack.io/lecture/courses/115
Background: RELRO
https://dreamhack.io/lecture/courses/99
Exploit Tech: Hook Overwrite
https://dreamhack.io/lecture/courses/102
Memory Corruption: Format String Bug
https://dreamhack.io/lecture/courses/114
Exploit Tech: Format String Bug
https://dreamhack.io/lecture/courses/110
Background:ptmalloc2
https://dreamhack.io/lecture/courses/98
Memory Corruption: Use After Free
https://dreamhack.io/lecture/courses/106
Exploit Tech: Use After Free
https://dreamhack.io/lecture/courses/119
Memory Corruption: Double Free Bug
https://dreamhack.io/lecture/courses/116
Exploit Tech: Tcache Poisoning
https://dreamhack.io/lecture/courses/107
Logical Bug: Type Error
https://dreamhack.io/lecture/courses/118
Logical Bug: Path Traversal
https://dreamhack.io/lecture/courses/111
Logical Bug: Command Injection
https://dreamhack.io/lecture/courses/108
Epilogue
https://dreamhack.io/lecture/courses/204
Reverse Engineering Fundamental V.2
Introduction: Reverse Engineering
https://dreamhack.io/lecture/courses/45
Background: Binary
https://dreamhack.io/lecture/courses/67
Background: Static Analysis vs. Dynamic Analysis
https://dreamhack.io/lecture/courses/46
Background: Computer Architecture
https://dreamhack.io/lecture/courses/62
Background: Windows Memory Layout
https://dreamhack.io/lecture/courses/209
x86 Assembly🤖: Essential Part(1)
https://dreamhack.io/lecture/courses/57
x86 Assembly🤖: Essential Part(2)
https://dreamhack.io/lecture/courses/38
Tools: IDA
https://dreamhack.io/lecture/courses/212
Exercise: Helloworld
https://dreamhack.io/lecture/courses/210
Exercise: rev-basic-0
https://dreamhack.io/lecture/courses/205
Exercise: rev-basic-1
https://dreamhack.io/lecture/courses/208
Exercise: patch
https://dreamhack.io/lecture/courses/217
Epilogue
https://dreamhack.io/lecture/courses/211
Cryptography Fundamental
머릿말
https://dreamhack.io/lecture/courses/69
고전 암호
https://dreamhack.io/lecture/courses/70
현대 암호
https://dreamhack.io/lecture/courses/71
블록암호: DES
https://dreamhack.io/lecture/courses/72
블록암호: AES
https://dreamhack.io/lecture/courses/73
블록암호: 운영모드
https://dreamhack.io/lecture/courses/74
키 교환: Diffie-Hellman 알고리즘
https://dreamhack.io/lecture/courses/75
공개키암호: RSA
https://dreamhack.io/lecture/courses/76
해시
https://dreamhack.io/lecture/courses/77
전자 서명
https://dreamhack.io/lecture/courses/78
맺음말
https://dreamhack.io/lecture/courses/79
개발자가 알아야 할 보안 지식
개발자가 알아야 할 보안 지식: Introduction
https://dreamhack.io/lecture/courses/120
안전한 웹 쿠키 사용법
https://dreamhack.io/lecture/courses/121
정규 표현식
https://dreamhack.io/lecture/courses/122
Web Hacking Fundamental V.2
Introduction
https://dreamhack.io/lecture/courses/185
Background: Web
https://dreamhack.io/lecture/courses/170
Background: HTTP/HTTPS
https://dreamhack.io/lecture/courses/199
Background: Web Browser
https://dreamhack.io/lecture/courses/171
Tools: Browser DevTools
https://dreamhack.io/lecture/courses/198
Background: Cookie & Session
https://dreamhack.io/lecture/courses/166
Exercise: Cookie
https://dreamhack.io/lecture/courses/176
Mitigation: Same Origin Policy
https://dreamhack.io/lecture/courses/186
ClientSide: XSS
https://dreamhack.io/lecture/courses/173
Exercise: XSS
https://dreamhack.io/lecture/courses/184
ClientSide: CSRF
https://dreamhack.io/lecture/courses/172
Exercise: CSRF
https://dreamhack.io/lecture/courses/203
Background: Relational DBMS
https://dreamhack.io/lecture/courses/169
ServerSide: SQL Injection
https://dreamhack.io/lecture/courses/191
Exercise: SQL Injection
https://dreamhack.io/lecture/courses/201
Exercise: Blind SQL Injection
https://dreamhack.io/lecture/courses/175
Background: Non-Relational DBMS
https://dreamhack.io/lecture/courses/168
ServerSide: NoSQL Injection
https://dreamhack.io/lecture/courses/189
Exercise: NoSQL Injection
https://dreamhack.io/lecture/courses/200
ServerSide: Command Injection
https://dreamhack.io/lecture/courses/187
ServerSide: File Vulnerability
https://dreamhack.io/lecture/courses/202
Exercise: File Vulnerability
https://dreamhack.io/lecture/courses/183
ServerSide: SSRF
https://dreamhack.io/lecture/courses/190
Exercise: SSRF
https://dreamhack.io/lecture/courses/182
Epilogue
https://dreamhack.io/lecture/courses/174
Exercise: Web Hacking Fundamental
Introduction
https://dreamhack.io/lecture/courses/213
Exercise: Cookie
https://dreamhack.io/lecture/courses/176
Exercise: XSS
https://dreamhack.io/lecture/courses/184
Exercise: CSRF
https://dreamhack.io/lecture/courses/203
Exercise: SQL Injection
https://dreamhack.io/lecture/courses/201
Exercise: Blind SQL Injection
https://dreamhack.io/lecture/courses/175
Exercise: NoSQL Injection
https://dreamhack.io/lecture/courses/200
Exercise: File Vulnerability
https://dreamhack.io/lecture/courses/183
Exercise: SSRF
https://dreamhack.io/lecture/courses/182
Epilogue
https://dreamhack.io/lecture/courses/214
Exercise: System Hacking Fundamental
Introduction
https://dreamhack.io/lecture/courses/215
Exploit Tech: Shellcode
https://dreamhack.io/lecture/courses/50
Exploit Tech: Return Address Overwrite
https://dreamhack.io/lecture/courses/58
Exploit Tech: Return to Shellcode
https://dreamhack.io/lecture/courses/64
Exploit Tech: Return to Library
https://dreamhack.io/lecture/courses/83
Exploit Tech: Return Oriented Programming
https://dreamhack.io/lecture/courses/84
Exploit Tech: Hook Overwrite
https://dreamhack.io/lecture/courses/102
Exploit Tech: Format String Bug
https://dreamhack.io/lecture/courses/110
Exploit Tech: Use After Free
https://dreamhack.io/lecture/courses/119
Exploit Tech: Tcache Poisoning
https://dreamhack.io/lecture/courses/107
Epilogue
https://dreamhack.io/lecture/courses/216
System Hacking Advanced V.2
Background: SECCOMP
https://dreamhack.io/lecture/courses/263
Exploit Tech: Bypass SECCOMP
https://dreamhack.io/lecture/courses/280
Background: Master Canary
https://dreamhack.io/lecture/courses/266
Exploit Tech: Master Canary
https://dreamhack.io/lecture/courses/267
Background: _rtld_global
https://dreamhack.io/lecture/courses/268
Exploit Tech: overwrite _rtld_global
https://dreamhack.io/lecture/courses/269
Exploit Tech: __environ
https://dreamhack.io/lecture/courses/270
Background: SigReturn-Oriented Programming
https://dreamhack.io/lecture/courses/277
Exploit Tech: SigReturn-Oriented Programming
https://dreamhack.io/lecture/courses/278
Background: _IO_FILE
https://dreamhack.io/lecture/courses/271
Exploit Tech: Bypass IO_validate_vtable
https://dreamhack.io/lecture/courses/272
Exploit Tech: _IO_FILE Arbitrary Address Read
https://dreamhack.io/lecture/courses/273
Exploit Tech: _IO_FILE Arbitrary Address Write
https://dreamhack.io/lecture/courses/274