정보 · 테크
[구] 커리큘럼 순서 백업

Web Hacking

Introduction of Webhacking
https://dreamhack.io/lecture/courses/6

Client-side Basic
https://dreamhack.io/lecture/courses/7

Server-side Basic
https://dreamhack.io/lecture/courses/15

Client-side Advanced
https://dreamhack.io/lecture/courses/18

Server-side Advanced - SQL Injection
https://dreamhack.io/lecture/courses/27

Server-side Advanced - NoSQL
https://dreamhack.io/lecture/courses/29

Server-side Advanced - Command Injection
https://dreamhack.io/lecture/courses/28

Server-side Advanced - File Vulnerability
https://dreamhack.io/lecture/courses/33

System Exploitation Fundamental

시스템 해킹 기초
https://dreamhack.io/lecture/courses/13

Memory Corruption - C (I)
https://dreamhack.io/lecture/courses/14

Memory Corruption - C (II)
https://dreamhack.io/lecture/courses/12

Memory Corruption - C++
https://dreamhack.io/lecture/courses/26

Logical Bugs
https://dreamhack.io/lecture/courses/1

Linux Exploitation & Mitigation Part 1
https://dreamhack.io/lecture/courses/2

Linux Exploitation & Mitigation Part 2
https://dreamhack.io/lecture/courses/3

Linux Exploitation & Mitigation Part 3
https://dreamhack.io/lecture/courses/4

Tools
https://dreamhack.io/lecture/courses/5

Advanced Linux Exploitation
https://dreamhack.io/lecture/courses/11

Heap Allocator Exploit
https://dreamhack.io/lecture/courses/16

Heap Allocator Exploit - 2
https://dreamhack.io/lecture/courses/34

Reverse Engineering

리버스 엔지니어링이란
https://dreamhack.io/lecture/courses/19

x64 기초
https://dreamhack.io/lecture/courses/20

puts("hello world!\n"); → x86_64 asm
https://dreamhack.io/lecture/courses/21

x64dbg 사용법
https://dreamhack.io/lecture/courses/22

hello-world.exe로 배우는 x64dbg 사용법
https://dreamhack.io/lecture/courses/23

쉬운 crackme를 통한 디버거 사용법 - 1
https://dreamhack.io/lecture/courses/24

쉬운 crackme를 통한 디버거 사용법 - 2
https://dreamhack.io/lecture/courses/25

Linux Kernel Exploit

Introduction: Linux Kernel Exploit🐧
https://dreamhack.io/lecture/courses/36

Tool: QEMU
https://dreamhack.io/lecture/courses/47

Background: Kernel Debugging
https://dreamhack.io/lecture/courses/51

Background: Tasks
https://dreamhack.io/lecture/courses/56

Exploit Tech: prepare & commit
https://dreamhack.io/lecture/courses/61

Mitigation: KASLR
https://dreamhack.io/lecture/courses/65

Exploit Tech: Kernel Leak
https://dreamhack.io/lecture/courses/68

Exploit Tech: ret2usr
https://dreamhack.io/lecture/courses/82

System Hacking Fundamental V.2

Welcome Hackers👨‍💻
https://dreamhack.io/lecture/courses/35

Tool: Environment Setup⚙️
https://dreamhack.io/lecture/courses/44

Background: Computer Architecture
https://dreamhack.io/lecture/courses/43

Background: Linux Memory Layout
https://dreamhack.io/lecture/courses/52

x86 Assembly🤖: Essential Part(1)
https://dreamhack.io/lecture/courses/37

x86 Assembly🤖: Essential Part(2)
https://dreamhack.io/lecture/courses/63

Tool: gdb
https://dreamhack.io/lecture/courses/55

Exploit Tech: Shellcode
https://dreamhack.io/lecture/courses/50

Background: Calling Convention
https://dreamhack.io/lecture/courses/54

Memory Corruption: Stack Buffer Overflow
https://dreamhack.io/lecture/courses/60

Exploit Tech: Return Address Overwrite
https://dreamhack.io/lecture/courses/58

Tool: pwntools
https://dreamhack.io/lecture/courses/59

Mitigation: Stack Canary
https://dreamhack.io/lecture/courses/112

Exploit Tech: Return to Shellcode
https://dreamhack.io/lecture/courses/64

Mitigation: NX & ASLR
https://dreamhack.io/lecture/courses/85

Background: Library - Static Link vs. Dynamic Link
https://dreamhack.io/lecture/courses/66

Exploit Tech: Return to Library
https://dreamhack.io/lecture/courses/83

Exploit Tech: Return Oriented Programming
https://dreamhack.io/lecture/courses/84

Background: PIE
https://dreamhack.io/lecture/courses/113

Memory Corruption: Out of Bounds
https://dreamhack.io/lecture/courses/115

Background: RELRO
https://dreamhack.io/lecture/courses/99

Exploit Tech: Hook Overwrite
https://dreamhack.io/lecture/courses/102

Memory Corruption: Format String Bug
https://dreamhack.io/lecture/courses/114

Exploit Tech: Format String Bug
https://dreamhack.io/lecture/courses/110

Background:ptmalloc2
https://dreamhack.io/lecture/courses/98

Memory Corruption: Use After Free
https://dreamhack.io/lecture/courses/106

Exploit Tech: Use After Free
https://dreamhack.io/lecture/courses/119

Memory Corruption: Double Free Bug
https://dreamhack.io/lecture/courses/116

Exploit Tech: Tcache Poisoning
https://dreamhack.io/lecture/courses/107

Logical Bug: Type Error
https://dreamhack.io/lecture/courses/118

Logical Bug: Path Traversal
https://dreamhack.io/lecture/courses/111

Logical Bug: Command Injection
https://dreamhack.io/lecture/courses/108

Epilogue
https://dreamhack.io/lecture/courses/204

Reverse Engineering Fundamental V.2

Introduction: Reverse Engineering
https://dreamhack.io/lecture/courses/45

Background: Binary
https://dreamhack.io/lecture/courses/67

Background: Static Analysis vs. Dynamic Analysis
https://dreamhack.io/lecture/courses/46

Background: Computer Architecture
https://dreamhack.io/lecture/courses/62

Background: Windows Memory Layout
https://dreamhack.io/lecture/courses/209

x86 Assembly🤖: Essential Part(1)
https://dreamhack.io/lecture/courses/57

x86 Assembly🤖: Essential Part(2)
https://dreamhack.io/lecture/courses/38

Tools: IDA
https://dreamhack.io/lecture/courses/212

Exercise: Helloworld
https://dreamhack.io/lecture/courses/210

Exercise: rev-basic-0
https://dreamhack.io/lecture/courses/205

Exercise: rev-basic-1
https://dreamhack.io/lecture/courses/208

Exercise: patch
https://dreamhack.io/lecture/courses/217

Epilogue
https://dreamhack.io/lecture/courses/211

Cryptography Fundamental

머릿말
https://dreamhack.io/lecture/courses/69

고전 암호
https://dreamhack.io/lecture/courses/70

현대 암호
https://dreamhack.io/lecture/courses/71

블록암호: DES
https://dreamhack.io/lecture/courses/72

블록암호: AES
https://dreamhack.io/lecture/courses/73

블록암호: 운영모드
https://dreamhack.io/lecture/courses/74

키 교환: Diffie-Hellman 알고리즘
https://dreamhack.io/lecture/courses/75

공개키암호: RSA
https://dreamhack.io/lecture/courses/76

해시
https://dreamhack.io/lecture/courses/77

전자 서명
https://dreamhack.io/lecture/courses/78

맺음말
https://dreamhack.io/lecture/courses/79

개발자가 알아야 할 보안 지식

개발자가 알아야 할 보안 지식: Introduction
https://dreamhack.io/lecture/courses/120

안전한 웹 쿠키 사용법
https://dreamhack.io/lecture/courses/121

정규 표현식
https://dreamhack.io/lecture/courses/122

Web Hacking Fundamental V.2

Introduction
https://dreamhack.io/lecture/courses/185

Background: Web
https://dreamhack.io/lecture/courses/170

Background: HTTP/HTTPS
https://dreamhack.io/lecture/courses/199

Background: Web Browser
https://dreamhack.io/lecture/courses/171

Tools: Browser DevTools
https://dreamhack.io/lecture/courses/198

Background: Cookie & Session
https://dreamhack.io/lecture/courses/166

Exercise: Cookie
https://dreamhack.io/lecture/courses/176

Mitigation: Same Origin Policy
https://dreamhack.io/lecture/courses/186

ClientSide: XSS
https://dreamhack.io/lecture/courses/173

Exercise: XSS
https://dreamhack.io/lecture/courses/184

ClientSide: CSRF
https://dreamhack.io/lecture/courses/172

Exercise: CSRF
https://dreamhack.io/lecture/courses/203

Background: Relational DBMS
https://dreamhack.io/lecture/courses/169

ServerSide: SQL Injection
https://dreamhack.io/lecture/courses/191

Exercise: SQL Injection
https://dreamhack.io/lecture/courses/201

Exercise: Blind SQL Injection
https://dreamhack.io/lecture/courses/175

Background: Non-Relational DBMS
https://dreamhack.io/lecture/courses/168

ServerSide: NoSQL Injection
https://dreamhack.io/lecture/courses/189

Exercise: NoSQL Injection
https://dreamhack.io/lecture/courses/200

ServerSide: Command Injection
https://dreamhack.io/lecture/courses/187

ServerSide: File Vulnerability
https://dreamhack.io/lecture/courses/202

Exercise: File Vulnerability
https://dreamhack.io/lecture/courses/183

ServerSide: SSRF
https://dreamhack.io/lecture/courses/190

Exercise: SSRF
https://dreamhack.io/lecture/courses/182

Epilogue
https://dreamhack.io/lecture/courses/174

Exercise: Web Hacking Fundamental

Introduction
https://dreamhack.io/lecture/courses/213

Exercise: Cookie
https://dreamhack.io/lecture/courses/176

Exercise: XSS
https://dreamhack.io/lecture/courses/184

Exercise: CSRF
https://dreamhack.io/lecture/courses/203

Exercise: SQL Injection
https://dreamhack.io/lecture/courses/201

Exercise: Blind SQL Injection
https://dreamhack.io/lecture/courses/175

Exercise: NoSQL Injection
https://dreamhack.io/lecture/courses/200

Exercise: File Vulnerability
https://dreamhack.io/lecture/courses/183

Exercise: SSRF
https://dreamhack.io/lecture/courses/182

Epilogue
https://dreamhack.io/lecture/courses/214

Exercise: System Hacking Fundamental

Introduction
https://dreamhack.io/lecture/courses/215

Exploit Tech: Shellcode
https://dreamhack.io/lecture/courses/50

Exploit Tech: Return Address Overwrite
https://dreamhack.io/lecture/courses/58

Exploit Tech: Return to Shellcode
https://dreamhack.io/lecture/courses/64

Exploit Tech: Return to Library
https://dreamhack.io/lecture/courses/83

Exploit Tech: Return Oriented Programming
https://dreamhack.io/lecture/courses/84

Exploit Tech: Hook Overwrite
https://dreamhack.io/lecture/courses/102

Exploit Tech: Format String Bug
https://dreamhack.io/lecture/courses/110

Exploit Tech: Use After Free
https://dreamhack.io/lecture/courses/119

Exploit Tech: Tcache Poisoning
https://dreamhack.io/lecture/courses/107

Epilogue
https://dreamhack.io/lecture/courses/216

System Hacking Advanced V.2

Background: SECCOMP
https://dreamhack.io/lecture/courses/263

Exploit Tech: Bypass SECCOMP
https://dreamhack.io/lecture/courses/280

Background: Master Canary
https://dreamhack.io/lecture/courses/266

Exploit Tech: Master Canary
https://dreamhack.io/lecture/courses/267

Background: _rtld_global
https://dreamhack.io/lecture/courses/268

Exploit Tech: overwrite _rtld_global
https://dreamhack.io/lecture/courses/269

Exploit Tech: __environ
https://dreamhack.io/lecture/courses/270

Background: SigReturn-Oriented Programming
https://dreamhack.io/lecture/courses/277

Exploit Tech: SigReturn-Oriented Programming
https://dreamhack.io/lecture/courses/278

Background: _IO_FILE
https://dreamhack.io/lecture/courses/271

Exploit Tech: Bypass IO_validate_vtable
https://dreamhack.io/lecture/courses/272

Exploit Tech: _IO_FILE Arbitrary Address Read
https://dreamhack.io/lecture/courses/273

Exploit Tech: _IO_FILE Arbitrary Address Write
https://dreamhack.io/lecture/courses/274

#정보
작성자 정보
securitypyo
대표 업적 없음
3년 전
감사합니다 !!
정보 · 테크 다른 글
글 제목
작성자
추천
조회
작성일
2021 Hot🔥 보안 사건 사고 - 하반기 [5]
avatar
Dreamhack
대표 업적 없음
2021 Hot🔥 보안 사건 사고 - 상반기 [0]
avatar
Dreamhack
대표 업적 없음
[구] 커리큘럼 순서 백업 [1]
avatar
juno2
답변 등록: 25
우리은행 모의해킹 경진대회가 10/20(수)까지 서류접수를 받습니다. [2]
우리콘
대표 업적 없음
커리큘럼 순서 [0]
avatar
Jaehoney
대표 업적 없음