Recommended Roadmaps
Recommendations based on your followings
Recommended Lectures
All Roadmaps
Looking for cybersecurity lectures for your organization? Train your team with Dreamhack.
All Lectures
Lecture title | Number of completed users | Average study time | Difficulty (Click to sort ascending) | Price | |
---|---|---|---|---|---|
Exploit Tech: Return to Library
Learn the principles and methods of attack techniques used for bypassing canaries and exploiting code in libraries.
| 2,305 people | 90 minutes | Easy | FREE | |
Exploit Tech: Meet-in-the-middle Attack
Learn how the meet-in-the-middle attack works.
| 733 people | 60 minutes | Very easy | FREE | |
FAT32 and NTFS File Systems
FAT32 and NTFS file systems
| 218 people | 60 minutes | Easy | FREE | |
Background: Binary
Describes what a binary is and the compilation process.
| 8,785 people | 30 minutes | Very easy | FREE | |
Exploit Tech: Length Eextension Attack
Learn how to compute another hash value from one hash value using a length extension attack on the MD5 hash function.
| 109 people | 60 minutes | Easy | FREE | |
Exploit Tech: Format String Bug
Practice format string attacks using example code with format string bug vulnerability.
| 1,559 people | 60 minutes | Easy | FREE | |
Exploit Tech: _IO_FILE Arbitrary Address Write
Learn an exploit that uses _IO_FILE to write a value to an arbitrary memory address.
| 498 people | 90 minutes | Difficult | FREE | |
Number Theory 2
You will study Fermat's little theorem, Euler's theorem, and practice with soem integer classes in SageMath.
| 299 people | 60 minutes | Easy | FREE | |
Web Hacking 101
Learn Web Hacking 101.
| 2,852 people | 30 minutes | Very easy | FREE | |
Firmware analysis
Learn firmware analysis.
| 105 people | 60 minutes | Medium | PAID | |
Registry
Windows registry
| 132 people | 60 minutes | Easy | FREE | |
Docker
Learn Docker.
| 2,448 people | 120 minutes | Easy | FREE | |
KAPE
Learn how to use KAPE
| 41 people | 90 minutes | Medium | FREE | |
Object Structure - WASM, Function
Learn the structure of WASMs and functions.
| 77 people | 60 minutes | Very Difficult | PAID | |
Background: React
Learn the essentials of React.
| 60 minutes | Very easy | ENTERPRISE | ||
Electronics/Electrical
Describes electronics/electricity.
| 40 people | 30 minutes | Easy | PAID | |
string
Learn how to identify and fix string input validation issues.
| 90 minutes | Difficult | ENTERPRISE | ||
URL validation
Learn how to validate and patch weak URLs.
| 120 minutes | Difficult | ENTERPRISE | ||
Practice Together: Firmware Emulation Practice
Work through the Firmware Emulation Exercise together.
| 75 people | 90 minutes | Medium | PAID | |
[WHA-C] Background: Content Security Policy
Describes the Content Security Policy.
| 1,017 people | 30 minutes | Medium | FREE | |
Netcat
Learn Netcat.
| 2,763 people | 30 minutes | Very easy | FREE | |
Blockchain and smart contracts
Understand what blockchain and smart contracts are.
| 30 minutes | Easy | ENTERPRISE | ||
Numbers
Learn how to identify and fix numeric input validation issues.
| 120 minutes | Difficult | ENTERPRISE | ||
Exploit Tech: Storage Collision
Read the Solidity code to find and exploit a storage conflict vulnerability in the proxy contract.
| 60 minutes | Easy | ENTERPRISE | ||
[WHA-C] Exploit Tech: Relative Path Overwrite
Learn the principles and methods of Relative Path Overwrite.
| 285 people | 30 minutes | Medium | FREE | |
Header
Learn the goals and organization of the C Secure Coding Roadmap.
| 5 minutes | Very easy | ENTERPRISE | ||
Numeric Errors
Learn about bugs that can occur with numeric operations in Solidity contracts.
| 30 minutes | Easy | ENTERPRISE | ||
Using safe libraries
Learn precautions to use the library safely.
| 120 minutes | Difficult | ENTERPRISE | ||
Exploit Tech: Initializer & Selfdestruct
Read the Solidity code to find a vulnerability in the Initializer and attack it via selfdestruct.
| 60 minutes | Easy | ENTERPRISE | ||
Unreliable data sources
Learn how to identify and fix issues with using data from untrusted sources.
| 30 minutes | Difficult | ENTERPRISE | ||
Proxy Contracts
Learn what a proxy contract is in Smart Contracts.
| 30 minutes | Easy | ENTERPRISE | ||
Syntax and characteristics of Solidity
Learn about Solidity, the leading language for writing smart contracts on Ethereum.
| 60 minutes | Medium | ENTERPRISE | ||
Sender
Learn the characteristics of keywords related to sender used in Solidity contracts and the vulnerabilities associated with them.
| 30 minutes | Easy | ENTERPRISE | ||
[WHA-S] Exercise: Command Injection Advanced
Solve Command Injection Advanced challenges together.
| 879 people | 60 minutes | Easy | FREE | |
Use secure JWTs
Identify issues you may encounter when using JWTs and how to fix them.
| 30 minutes | Difficult | ENTERPRISE | ||
Hard-coded sensitive information
Learn the types of sensitive information that are hard-coded.
| 30 minutes | Difficult | ENTERPRISE | ||
IDOR
Learn about vulnerable cases where IDOR occurs and how to patch them.
| 60 minutes | Difficult | ENTERPRISE | ||
Lack of Rate Limiting
Learn the need for rate limits.
| 30 minutes | Difficult | ENTERPRISE | ||
[WHA-S] Exercise: Bypass WAF
Let's unpack Bypass WAF together.
| 1,116 people | 60 minutes | Easy | FREE | |
Exposing sensitive information
Learn examples of sensitive information exposure.
| 30 minutes | Difficult | ENTERPRISE | ||
Using Lock securely
Learn how to safely use Locks in the Kotlin environment.
| 60 minutes | Difficult | ENTERPRISE | ||
[WHA-S] Exploit Tech: DBMS Misconfiguration
Learn the vulnerabilities that can be caused by DBMS misconfiguration.
| 972 people | 60 minutes | Medium | FREE | |
Password-related
Learn password-related vulnerabilities and how to patch them.
| 30 minutes | Difficult | ENTERPRISE | ||
[WHA-S] ExploitTech: Error & Time based SQL Injection
Learn Error based SQL Injection and Time based SQL Injection.
| 1,677 people | 60 minutes | Medium | FREE | |
[WHA-S] ExploitTech: Blind SQL Injection Advanced
Learn the principles and methods of attacks that are more efficient than traditional Blind SQL Injection.
| 1,765 people | 30 minutes | Medium | FREE | |
[WHA-C] Exploit Tech: XS-Search
Learn the principles and methods of XS-Search.
| 617 people | 30 minutes | Medium | FREE | |
[WHA-S] Exercise: Blind SQL Injection Advanced
Let's walk through Blind SQL Injection Advanced together.
| 1,530 people | 90 minutes | Easy | FREE | |
Client-side vulnerabilities
Learn about XSS and CSRF.
| 60 minutes | Very easy | ENTERPRISE | ||
[WHA-S] ExploitTech: DBMS Fingerprinting
Learn the principles and methods of DBMS-specific information gathering.
| 1,030 people | 30 minutes | Medium | FREE | |
[WHA-S] Exercise: CouchDB
Let's unpack NoSQL-CouchDB together.
| 773 people | 60 minutes | Easy | FREE |
Exploit Tech: Return to Library
2305
people completed this lecture.
Exploit Tech: Meet-in-the-middle Attack
733
people completed this lecture.
FAT32 and NTFS File Systems
218
people completed this lecture.
Background: Binary
8785
people completed this lecture.
Exploit Tech: Length Eextension Attack
109
people completed this lecture.
Exploit Tech: Format String Bug
1559
people completed this lecture.
Exploit Tech: _IO_FILE Arbitrary Address Write
498
people completed this lecture.
Number Theory 2
299
people completed this lecture.
Web Hacking 101
2852
people completed this lecture.
Firmware analysis
105
people completed this lecture.
Registry
132
people completed this lecture.
Docker
2448
people completed this lecture.
KAPE
41
people completed this lecture.
Object Structure - WASM, Function
77
people completed this lecture.
Electronics/Electrical
40
people completed this lecture.
Practice Together: Firmware Emulation Practice
75
people completed this lecture.
[WHA-C] Background: Content Security Policy
1017
people completed this lecture.
Netcat
2763
people completed this lecture.
[WHA-C] Exploit Tech: Relative Path Overwrite
285
people completed this lecture.
[WHA-S] Exercise: Command Injection Advanced
879
people completed this lecture.
[WHA-S] Exercise: Bypass WAF
1116
people completed this lecture.
[WHA-S] Exploit Tech: DBMS Misconfiguration
972
people completed this lecture.
[WHA-S] ExploitTech: Error & Time based SQL Injection
1677
people completed this lecture.
[WHA-S] ExploitTech: Blind SQL Injection Advanced
1765
people completed this lecture.
[WHA-C] Exploit Tech: XS-Search
617
people completed this lecture.
[WHA-S] Exercise: Blind SQL Injection Advanced
1530
people completed this lecture.
[WHA-S] ExploitTech: DBMS Fingerprinting
1030
people completed this lecture.
[WHA-S] Exercise: CouchDB
773
people completed this lecture.