From the beginning to the real world.

Check out all the lessons covered at a glance.

Course title
Finished users
Taken time
Difficulty
(Click to sort ascending)
Price
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Storage
Solidity 코드를 읽고 컨트랙트의 스토리지로부터 값을 읽어와 문제를 풀어봅니다.
60 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Background: Web
In this lecture, you'll learn about the web and its components.
14,534 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
펌웨어 분석
펌웨어 분석을 학습합니다.
74 60 minutes Normal
This course is opened to Enterprise. See the Enterprise introduction
Background: Cloud
클라우드 기술과 클라우드의 보안에 대해 간단히 설명합니다.
30 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
암호 관련
암호 관련 취약점과 패치 방법을 학습합니다.
30 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
V8 Exploit Technique
V8 Exploit의 원리 및 방법을 학습합니다.
60 90 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
문자열
문자열 입력값 검증 문제 확인 및 수정 방안을 학습합니다.
90 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
안전한 라이브러리 사용법
라이브러리를 안전하기 사용하기 위한 주의사항을 학습합니다.
120 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Introduction
Learn about the goals and objectives of the cryptography roadmap and the topics it covers.
620 15 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Digital Signatures
Introduce the concept of digital signatures and learn the mathematical principles of different digital signatures.
33 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
블록체인과 스마트 컨트랙트
블록체인과 스마트 컨트랙트가 어떤 개념인지 이해합니다.
30 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: Cookie & Session
Learn how to gain administrator privileges with session information.
1,645 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
AWS: Data Security (v1 legacy)
데이터 보안과 관련된 AWS 서비스를 소개하고, 이들을 안전하게 설정하는 방법을 학습합니다.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
강의 소개👨‍💻
디지털 포렌식 로드맵의 목표와 구성을 알아봅시다.
3 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: File Vulnerability-2
Access the desired file via a path traversal vulnerability.
530 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: ROP x64
Acquire a shell through return-oriented programming (ROP) techniques in the x64 environment.
392 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
AWS: Network (v1 legacy)
네트워크와 관련된 AWS 서비스를 소개하고, 이들을 안전하게 설정하는 방법을 학습합니다.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: CSRF-2
Learn how to use CSRF attack techniques to gain administrator privileges.
941 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Associated Nonces
Learn why the nonce k used in DSA is vulnerable when it is not a random value.
16 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Out of bounds
x86 환경에서 Out of bounds 취약점을 이용해 임의의 명령어를 실행하여 공격에 성공합니다.
267 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
$LogFile, $UsnJrnl
$LogFile, $UsnJrnl
40 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Meet-in-the-middle Attack
Learn how the meet-in-the-middle attack works.
339 60 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
아티팩트 탐색
메모리 포렌식을 통한 아티팩트 탐색
120 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Classical Ciphers
Learn the types of classic ciphers and how to attack them simply.
410 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Number Theory 2
You will study Fermat's little theorem, Euler's theorem, and practice with soem integer classes in SageMath.
137 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Signature without Hashing
Learn why DSA signatures require a secure hash function.
26 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Heap Allocator Exploit
ptmalloc2 allocator의 원리 및 공격하는 방법을 학습합니다.
886 150 minutes Difficult FREE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: rev-basic-3
rev-basic-3을 함께 풀어봅니다.
460 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Shellcode
셸코드가 무엇이고, 어떻게 작성하며 디버깅하는지 학습합니다.
4,551 90 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Heap Allocator Exploit - 2
GLIBC 2.29 버전에 추가된 보호 기법을 이해하고 공격하는 방법을 학습합니다.
677 60 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
전자/전기
전자/전기에 대해서 설명합니다.
30 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
PCB
PCB에 대해서 설명합니다.
120 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
V8 Debug
V8엔진 Debug를 학습합니다.
82 30 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
Track_the_file
Track_the_file
60 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
strange-program
strange-program
60 minutes Very Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
AWS: Monitoring&Inspection (v1 legacy)
AWS의 모니터링 서비스와 보안 감사 서비스에 대해 설명합니다.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
x86 Assembly🤖: Essential Part(1)
Learn the fundamental assembly language for system hacking.
6,414 60 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Tcache Poisoning
Tcache Poisoning의 원리와 효과에 대해 알아보고 공격 기법을 실습합니다.
991 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
장비 사용법
장비 사용법을 학습합니다.
120 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Virtual Machine
Learn the virtual machine.
4,180 120 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Web Hacking 101
Learn Web Hacking 101.
1,963 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
디버그 인터페이스 사용
디버그 인터페이스를 사용한 펌웨어 추출 방법을 학습합니다.
120 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
플래시 메모리 데이터 추출
플래시 메모리 데이터 추출 방법에 대해서 학습합니다.
60 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
eMMC 데이터 추출
eMMC 데이터 추출 방법을 학습합니다.
60 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Return Oriented Programming
Learn the principles and methods of Return Oriented Programming.
1,815 90 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
이벤트 로그
이벤트 로그
60 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Introducing Embedded!
임베디드 해킹 로드맵의 목표와 구성을 알아봅니다.
408 15 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Introducing Hardware!
하드웨어 해킹 로드맵의 목표와 구성을 알아봅니다.
15 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
x86 Assembly🤖: Essential Part(2)
Learn assembly instructions for stack and procedure operations.
1,592 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Number Theory 1
Learn the basic modulo operations used in cryptography and the techniques used for calculating exponentiations.
179 60 minutes Easy FREE
Background: Web
14534 finished this course.
펌웨어 분석
74 finished this course.
V8 Exploit Technique
60 finished this course.
Introduction
620 finished this course.
Digital Signatures
33 finished this course.
Exercise: Cookie & Session
1645 finished this course.
Exercise: File Vulnerability-2
530 finished this course.
Exploit Tech: ROP x64
392 finished this course.
Exercise: CSRF-2
941 finished this course.
Exploit Tech: Associated Nonces
16 finished this course.
Exploit Tech: Out of bounds
267 finished this course.
Classical Ciphers
410 finished this course.
Number Theory 2
137 finished this course.
Heap Allocator Exploit
886 finished this course.
Exercise: rev-basic-3
460 finished this course.
Exploit Tech: Shellcode
4551 finished this course.
Heap Allocator Exploit - 2
677 finished this course.
V8 Debug
82 finished this course.
x86 Assembly🤖: Essential Part(1)
6414 finished this course.
Exploit Tech: Tcache Poisoning
991 finished this course.
Virtual Machine
4180 finished this course.
Web Hacking 101
1963 finished this course.
Introducing Embedded!
408 finished this course.
x86 Assembly🤖: Essential Part(2)
1592 finished this course.
Number Theory 1
179 finished this course.