비기너즈
시스템해킹
리버싱
웹해킹
암호학
모바일해킹
클라우드
시큐어코딩
하드웨어
Looking for cybersecurity courses for your organization? Train your team with Dreamhack.
All courses provided by Dreamhack.
All courses
Course title
Finished users
Taken time
Difficulty
(Click to sort ascending)
Price
This course is opened to Enterprise. See the Enterprise introduction
x86 Assembly🤖: Essential Part(1)
시스템 해킹을 배우기 위해 필요한 기초적인 어셈블리 언어를 학습합니다.
6,186 60 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
펌웨어 분석
펌웨어 분석을 학습합니다.
67 60 minutes Normal
This course is opened to Enterprise. See the Enterprise introduction
Background: Cloud
클라우드 기술과 클라우드의 보안에 대해 간단히 설명합니다.
30 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Background: Web
이번 코스에서는 웹과 각각의 구성 요소에 대해 배웁니다.
13,986 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
안전한 라이브러리 사용법
라이브러리를 안전하기 사용하기 위한 주의사항을 학습합니다.
120 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
암호 관련
암호 관련 취약점과 패치 방법을 학습합니다.
30 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
V8 Exploit Technique
V8 Exploit의 원리 및 방법을 학습합니다.
54 90 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
문자열
문자열 입력값 검증 문제 확인 및 수정 방안을 학습합니다.
90 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Introduction
Learn about the goals and objectives of the cryptography roadmap and the topics it covers.
442 15 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Digital Signatures
Introduce the concept of digital signatures and learn the mathematical principles of different digital signatures.
19 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: Cookie & Session
세션 정보를 통해 관리자 권한을 획득하는 방법을 학습합니다.
1,360 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
AWS: Data Security (v1 legacy)
데이터 보안과 관련된 AWS 서비스를 소개하고, 이들을 안전하게 설정하는 방법을 학습합니다.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: XSS-2
XSS를 이용하여 다른 이용자의 쿠키를 탈취하는 방법을 학습합니다.
1,011 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: Command Injection
Command Injection을 통해 원하는 명령어를 실행합니다.
665 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: ROP x64
Acquire a shell through return-oriented programming (ROP) techniques in the x64 environment.
337 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
AWS: Network (v1 legacy)
네트워크와 관련된 AWS 서비스를 소개하고, 이들을 안전하게 설정하는 방법을 학습합니다.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: CSRF-2
CSRF 공격 기법을 사용해 관리자 권한을 가져오는 방법을 학습합니다.
752 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Associated Nonces
Learn why the nonce k used in DSA is vulnerable when it is not a random value.
9 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: File Vulnerability-2
Path traversal 취약점을 통해 원하는 파일에 접근합니다.
422 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Out of bounds
x86 환경에서 Out of bounds 취약점을 이용해 임의의 명령어를 실행하여 공격에 성공합니다.
229 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: Cookie
워게임 문제를 풀어보면서 쿠키에 대한 이해를 높여봅니다.
7,274 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Classical Ciphers
Learn the types of classic ciphers and how to attack them simply.
286 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Number Theory 2
You will study Fermat's little theorem, Euler's theorem, and practice with soem integer classes in SageMath.
84 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Signature without Hashing
Learn why DSA signatures require a secure hash function.
13 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Heap Allocator Exploit
ptmalloc2 allocator의 원리 및 공격하는 방법을 학습합니다.
874 150 minutes Difficult FREE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: rev-basic-3
rev-basic-3을 함께 풀어봅니다.
368 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Shellcode
셸코드가 무엇이고, 어떻게 작성하며 디버깅하는지 학습합니다.
4,369 90 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Heap Allocator Exploit - 2
GLIBC 2.29 버전에 추가된 보호 기법을 이해하고 공격하는 방법을 학습합니다.
666 60 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
전자/전기
전자/전기에 대해서 설명합니다.
30 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
PCB
PCB에 대해서 설명합니다.
120 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
V8 Debug
V8엔진 Debug를 학습합니다.
76 30 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
AWS: Monitoring&Inspection (v1 legacy)
AWS의 모니터링 서비스와 보안 감사 서비스에 대해 설명합니다.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Tcache Poisoning
Tcache Poisoning의 원리와 효과에 대해 알아보고 공격 기법을 실습합니다.
955 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
장비 사용법
장비 사용법을 학습합니다.
120 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
ServerSide: NoSQL Injection
서버 사이드 공격인 NoSQL Injection에 대해 학습합니다.
3,502 90 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
디버그 인터페이스 사용
디버그 인터페이스를 사용한 펌웨어 추출 방법을 학습합니다.
120 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
플래시 메모리 데이터 추출
플래시 메모리 데이터 추출 방법에 대해서 학습합니다.
60 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
eMMC 데이터 추출
eMMC 데이터 추출 방법을 학습합니다.
60 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Return Oriented Programming
Learn the principles and methods of Return Oriented Programming.
1,763 90 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Introducing Embedded!
임베디드 해킹 로드맵의 목표와 구성을 알아봅니다.
376 15 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Introducing Hardware!
하드웨어 해킹 로드맵의 목표와 구성을 알아봅니다.
15 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
x86 Assembly🤖: Essential Part(2)
스택과 프로시저에 대한 어셈블리 명령어를 학습합니다.
1,336 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Background: ptmalloc2
ptmalloc2의 주요 객체와 관리 메커니즘을 설명합니다.
317 90 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Background: PIE
Describe Position-Independent Executable (PIE).
398 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
여러가지 공격 기법
하드웨어 해킹의 여러가지 공격 기법을 학습합니다.
120 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Background: Static Analysis vs. Dynamic Analysis
소프트웨어 분석 기법의 갈래인 정적 분석과 동적 분석, 그리고 둘의 차이점을 설명합니다.
1,231 15 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
ServerSide: Command Injection
서버 사이드의 공격인 Command Injection를 학습합니다.
3,141 60 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Meet-in-the-middle Attack
Learn how the meet-in-the-middle attack works.
231 60 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Epilogue
Hardware Hacking을 마무리합니다.
15 minutes Unknown ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Background: RELRO
Describe RELRO protection techniques and how to bypass them.
1,438 60 minutes Very easy FREE
x86 Assembly🤖: Essential Part(1)
6186 finished this course.
펌웨어 분석
67 finished this course.
Background: Web
13986 finished this course.
V8 Exploit Technique
54 finished this course.
Introduction
442 finished this course.
Digital Signatures
19 finished this course.
Exercise: Cookie & Session
1360 finished this course.
Exercise: XSS-2
1011 finished this course.
Exercise: Command Injection
665 finished this course.
Exploit Tech: ROP x64
337 finished this course.
Exercise: CSRF-2
752 finished this course.
Exploit Tech: Associated Nonces
9 finished this course.
Exercise: File Vulnerability-2
422 finished this course.
Exploit Tech: Out of bounds
229 finished this course.
Exercise: Cookie
7274 finished this course.
Classical Ciphers
286 finished this course.
Number Theory 2
84 finished this course.
Heap Allocator Exploit
874 finished this course.
Exercise: rev-basic-3
368 finished this course.
Exploit Tech: Shellcode
4369 finished this course.
Heap Allocator Exploit - 2
666 finished this course.
V8 Debug
76 finished this course.
Exploit Tech: Tcache Poisoning
955 finished this course.
ServerSide: NoSQL Injection
3502 finished this course.
Introducing Embedded!
376 finished this course.
x86 Assembly🤖: Essential Part(2)
1336 finished this course.
Background: ptmalloc2
317 finished this course.
Background: PIE
398 finished this course.
ServerSide: Command Injection
3141 finished this course.
Background: RELRO
1438 finished this course.