From the beginning to the real world.
Check out all the lectures in Dreamhack.
Lecture title | Number of completed users | Average study time | Difficulty (Click to sort ascending) | Price | |
---|---|---|---|---|---|
Proxy Contracts
Learn what a proxy contract is in Smart Contracts.
| 30 minutes | Easy | ENTERPRISE | ||
Exploit Tech: Meet-in-the-middle Attack
Learn how the meet-in-the-middle attack works.
| 1,001 people | 60 minutes | Very easy | FREE | |
FAT32 and NTFS File Systems
FAT32 and NTFS file systems
| 363 people | 60 minutes | Easy | FREE | |
[WHA-S] Background: SQL DML
Describes the SQL DML syntax.
| 2,622 people | 60 minutes | Medium | FREE | |
Exploit Tech: Length Eextension Attack
Learn how to compute another hash value from one hash value using a length extension attack on the MD5 hash function.
| 152 people | 60 minutes | Easy | FREE | |
Memory Corruption: Stack Buffer Overflow
We will examine the concept of stack buffer overflow and learn about the security threats that can arise from it.
| 3,849 people | 60 minutes | Easy | FREE | |
Exploit Tech: Format String Bug
Practice format string attacks using example code with format string bug vulnerability.
| 1,707 people | 60 minutes | Easy | FREE | |
Block Cipher: AES
Learn the structure of AES and the encryption process.
| 307 people | 60 minutes | Very easy | FREE | |
Exploit Tech: _IO_FILE Arbitrary Address Write
Learn an exploit that uses _IO_FILE to write a value to an arbitrary memory address.
| 578 people | 90 minutes | Difficult | FREE | |
Number Theory 2
You will study Fermat's little theorem, Euler's theorem, and practice with soem integer classes in SageMath.
| 416 people | 60 minutes | Easy | FREE | |
Web Hacking 101
Learn Web Hacking 101.
| 3,514 people | 30 minutes | Very easy | FREE | |
Exercise: Blind SQL Injection
Improve your understanding of blind SQL injection by solving a wargame challenge.
| 4,568 people | 120 minutes | Easy | FREE | |
Background: Web
In this lecture, you'll learn about the web and its components.
| 18,712 people | 60 minutes | Easy | FREE | |
Background: Cookie & Session
Explain cookies and sessions.
| 11,653 people | 60 minutes | Very easy | FREE | |
Block ciphers and modes of operation
Learn the different modes of operation for block ciphers, including ECB, CBC, and CTR.
| 209 people | 30 minutes | Very easy | FREE | |
Background: HTTP/HTTPS
Learn about HTTP and HTTPS, the protocols used for web communication.
| 18,762 people | 60 minutes | Easy | FREE | |
Sender
Learn the characteristics of keywords related to sender used in Solidity contracts and the vulnerabilities associated with them.
| 30 minutes | Easy | ENTERPRISE | ||
Background: Web Browser
Learn about the concepts and roles of web browsers.
| 13,309 people | 60 minutes | Easy | FREE | |
[WHA-C] Exercise: CSP Bypass
Let's solve CSP Bypass together.
| 988 people | 90 minutes | Easy | FREE | |
Exercise: Command Injection
Executes the desired command via command injection.
| 2,147 people | 30 minutes | Very easy | FREE | |
Background: Relational DBMS
In this lecture, you'll learn about relational database management systems and SQL.
| 5,449 people | 60 minutes | Easy | FREE | |
ServerSide: Command Injection
Learn command injection, a server-side attack.
| 4,434 people | 60 minutes | Very easy | FREE | |
ClientSide: XSS
Learn XSS, a common client-side attack.
| 8,628 people | 90 minutes | Easy | FREE | |
ServerSide: SSRF
Learn about SSRF, a server-side attack.
| 3,492 people | 60 minutes | Very easy | FREE | |
ClientSide: CSRF
Learn CSRF, a client-side attack.
| 6,583 people | 60 minutes | Easy | FREE | |
Background: Linux Memory Layout
Describes the memory structure of a Linux process.
| 9,354 people | 30 minutes | Very easy | FREE | |
ServerSide: SQL Injection
Learn about SQL Injection, a server-side attack.
| 5,535 people | 90 minutes | Easy | FREE | |
Tool: Environment Setup⚙️
Describe how to use virtualization software to create the environment needed for roadmap
| 4,599 people | 15 minutes | Very easy | FREE | |
Mitigation: Stack Canary
Learn about Stack Canary, which protects the return address from stack buffer overflow.
| 3,189 people | 30 minutes | Very easy | FREE | |
Classical Ciphers
Learn the types of classic ciphers and how to attack them simply.
| 1,185 people | 30 minutes | Very easy | FREE | |
Coding
Learn the basics of coding.
| 3,929 people | 120 minutes | Easy | FREE | |
Background: Computer Architecture
Describes computer architecture, instruction set architecture, and x86-64 architecture.
| 10,279 people | 30 minutes | Very easy | FREE | |
Exploit Tech: Return Address Overwrite
Learn the principles and methods of return address overwrite attacks through a simple example.
| 3,835 people | 120 minutes | Easy | FREE | |
Exploit Tech: Return to Shellcode
Learn attack techniques for bypassing canary and hijacking execution flow to shellcode.
| 2,864 people | 90 minutes | Easy | FREE | |
Memory Corruption: Double Free Bug
We will learn the causes and effects of the Double Free Bug and protection techniques to prevent it.
| 1,405 people | 30 minutes | Very easy | FREE | |
x86 Assembly🤖: Essential Part(1)
Learn the fundamental assembly language for system hacking.
| 7,851 people | 60 minutes | Very easy | FREE | |
Exploit Tech: Return to Library
Learn the principles and methods of attack techniques used for bypassing canaries and exploiting code in libraries.
| 2,510 people | 90 minutes | Easy | FREE | |
Exploit Tech: Shellcode
Learn what shellcode is, how to write it, and how to debug it.
| 5,705 people | 90 minutes | Easy | FREE | |
Background: Computer Architecture
Describes computer structure and instruction set structure, and the x86-64 architecture.
| 6,692 people | 60 minutes | Easy | FREE | |
Background: Library - Static Link vs. Dynamic Link
Learn the concepts of libraries and links, PLT and GOT in Linux.
| 2,423 people | 60 minutes | Easy | FREE | |
Background: ptmalloc2
Describes the main objects and memory management mechanisms of ptmalloc2.
| 814 people | 90 minutes | Easy | FREE | |
x86 Assembly🤖: Essential Part(1)
Learn the necessary assembly language to learn reverse engineering.
| 5,475 people | 60 minutes | Very easy | FREE | |
Introduction
Learn about the goals and objectives of the cryptography roadmap and the topics it covers.
| 1,768 people | 15 minutes | Very easy | FREE | |
Hash Functions
Learn the role and types of hash algorithms and the Message Authentication Code (MAC) using them.
| 234 people | 60 minutes | Very easy | FREE | |
Exploit Tech: Hook Overwrite
Describe hook overwrite attack techniques and practice with examples.
| 1,945 people | 60 minutes | Very easy | FREE | |
Logical Bug: Type Error
Learn the bugs that can occur due to incorrect usage of data types.
| 1,167 people | 60 minutes | Easy | FREE | |
Background: Binary
Describes what a binary is and the compilation process.
| 9,547 people | 30 minutes | Very easy | FREE | |
Memory Corruption: Out of Bounds
Learn about the types of code with OOB vulnerability, and how OOB can be leveraged in attacks.
| 1,783 people | 30 minutes | Very easy | FREE | |
Logical Bug: Command Injection
Let's learn about command injection vulnerabilities, which occurs by misusing functions that execute system commands.
| 1,245 people | 30 minutes | Very easy | FREE | |
Background: Static Analysis vs. Dynamic Analysis
Describe the two branches of software analysis techniques, static and dynamic analysis, and the differences between the two.
| 3,330 people | 15 minutes | Very easy | FREE |
Exploit Tech: Meet-in-the-middle Attack
1001
people completed this lecture.
FAT32 and NTFS File Systems
363
people completed this lecture.
[WHA-S] Background: SQL DML
2622
people completed this lecture.
Exploit Tech: Length Eextension Attack
152
people completed this lecture.
Memory Corruption: Stack Buffer Overflow
3849
people completed this lecture.
Exploit Tech: Format String Bug
1707
people completed this lecture.
Block Cipher: AES
307
people completed this lecture.
Exploit Tech: _IO_FILE Arbitrary Address Write
578
people completed this lecture.
Number Theory 2
416
people completed this lecture.
Web Hacking 101
3514
people completed this lecture.
Exercise: Blind SQL Injection
4568
people completed this lecture.
Background: Web
18712
people completed this lecture.
Background: Cookie & Session
11653
people completed this lecture.
Block ciphers and modes of operation
209
people completed this lecture.
Background: HTTP/HTTPS
18762
people completed this lecture.
Background: Web Browser
13309
people completed this lecture.
[WHA-C] Exercise: CSP Bypass
988
people completed this lecture.
Exercise: Command Injection
2147
people completed this lecture.
Background: Relational DBMS
5449
people completed this lecture.
ServerSide: Command Injection
4434
people completed this lecture.
ClientSide: XSS
8628
people completed this lecture.
ServerSide: SSRF
3492
people completed this lecture.
ClientSide: CSRF
6583
people completed this lecture.
Background: Linux Memory Layout
9354
people completed this lecture.
ServerSide: SQL Injection
5535
people completed this lecture.
Tool: Environment Setup⚙️
4599
people completed this lecture.
Mitigation: Stack Canary
3189
people completed this lecture.
Classical Ciphers
1185
people completed this lecture.
Coding
3929
people completed this lecture.
Background: Computer Architecture
10279
people completed this lecture.
Exploit Tech: Return Address Overwrite
3835
people completed this lecture.
Exploit Tech: Return to Shellcode
2864
people completed this lecture.
Memory Corruption: Double Free Bug
1405
people completed this lecture.
x86 Assembly🤖: Essential Part(1)
7851
people completed this lecture.
Exploit Tech: Return to Library
2510
people completed this lecture.
Exploit Tech: Shellcode
5705
people completed this lecture.
Background: Computer Architecture
6692
people completed this lecture.
Background: Library - Static Link vs. Dynamic Link
2423
people completed this lecture.
Background: ptmalloc2
814
people completed this lecture.
x86 Assembly🤖: Essential Part(1)
5475
people completed this lecture.
Introduction
1768
people completed this lecture.
Hash Functions
234
people completed this lecture.
Exploit Tech: Hook Overwrite
1945
people completed this lecture.
Logical Bug: Type Error
1167
people completed this lecture.
Background: Binary
9547
people completed this lecture.
Memory Corruption: Out of Bounds
1783
people completed this lecture.
Logical Bug: Command Injection
1245
people completed this lecture.
Background: Static Analysis vs. Dynamic Analysis
3330
people completed this lecture.