Beginners

드림비기너즈 로드맵은 정보 보안을 공부하려는 초심자를 위한 학습 로드맵으로, 정보보호 및 CTF를 위한 다양한 주제와 기술을 통해 필수적이며 기초적인 지식을 학습하는 로드맵입니다.

  • How to use : 워게임, 드림핵 강의, CTF와 같이 드림핵을 구성하고 있는 요소를 배우고, 사용방법에 대해서 배웁니다.
  • Environment Setup : 가상 머신을 설정하는 방법에 대해서 학습합니다.
  • DH101 : 컴퓨터 과학 기초부터 시작하여 리눅스, 코딩에 대해서 학습하고, 드림핵에 있는 시스템 해킹, 리버싱, 웹해킹, 암호학 등 강의를 수강하기위한 어떤 사전 지식이 필요한지 설명합니다.
  • Tips : 정보 보안 공부를 하면서 작업 효율을 높여주는 명령어 혹은 툴에 대해서 설명합니다.
Looking for cybersecurity courses for your organization? Train your team with Dreamhack.
Courses from this category
All courses in this category
Course title
Finished users
Taken time
Difficulty
(Click to sort ascending)
Price
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: ROP x64
Acquire a shell through return-oriented programming (ROP) techniques in the x64 environment.
562 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Storage
Solidity 코드를 읽고 컨트랙트의 스토리지로부터 값을 읽어와 문제를 풀어봅니다.
60 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Background: Web
In this lecture, you'll learn about the web and its components.
15,900 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
펌웨어 분석
펌웨어 분석을 학습합니다.
84 60 minutes Normal
This course is opened to Enterprise. See the Enterprise introduction
DreamBank - 커뮤니티 / 고객센터 서비스 (Community)
DreamBank의 커뮤니티 / 고객센터 서비스(Community)에서 문제점을 찾고 패치하는 방법을 학습합니다.
150 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Regular Expressions
Learn regular expressions.
1,529 30 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Meet-in-the-middle Attack
Learn how the meet-in-the-middle attack works.
515 60 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Introduction
Linux Kernel 로드맵의 목표와 구성을 알아봅니다.
15 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
전자/전기
전자/전기에 대해서 설명합니다.
19 30 minutes Easy
This course is opened to Enterprise. See the Enterprise introduction
SSP
SSP 보호 기법에 대해 공부합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
SSH
Learn SSH.
1,961 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Classical Ciphers
Learn the types of classic ciphers and how to attack them simply.
626 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Ghidra 디버거
Ghidra 디버거를 학습합니다.
437 150 minutes Easy
This course is opened to Enterprise. See the Enterprise introduction
Markdown
Learn Markdown syntax.
1,015 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Background: Cloud
클라우드 기술과 클라우드의 보안에 대해 간단히 설명합니다.
30 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
숫자
숫자 입력값 검증 문제 확인 및 수정 방안을 학습합니다.
120 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
암호 관련
암호 관련 취약점과 패치 방법을 학습합니다.
30 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
V8 Exploit Technique
V8 Exploit의 원리 및 방법을 학습합니다.
66 90 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
Exercise: Patch Chall - Kotlin Spring
Solve 'Patch Chall - Kotlin Spring'.
60 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
ServerSide: File Vulnerability
Learn server-side attacks: file uploads and downloads.
3,256 90 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
문자열
문자열 입력값 검증 문제 확인 및 수정 방안을 학습합니다.
90 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
안전한 라이브러리 사용법
라이브러리를 안전하기 사용하기 위한 주의사항을 학습합니다.
120 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Introduction
Learn about the goals and objectives of the cryptography roadmap and the topics it covers.
955 15 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Digital Signatures
Introduce the concept of digital signatures and learn the mathematical principles of different digital signatures.
69 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
블록체인과 스마트 컨트랙트
블록체인과 스마트 컨트랙트가 어떤 개념인지 이해합니다.
30 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Azure: Network
네트워크와 관련된 Azure 서비스를 소개하고, 이들을 안전하게 설정하는 방법을 학습합니다.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-C] Background: Content Security Policy
Describes the Content Security Policy.
904 30 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
Number Theory 2
You will study Fermat's little theorem, Euler's theorem, and practice with soem integer classes in SageMath.
216 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Coding
Learn the basics of coding.
2,728 120 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Signature without Hashing
Learn why DSA signatures require a secure hash function.
55 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Introduction
Ghidra 로드맵의 목표와 구성을 알아봅니다.
736 15 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Heap Allocator Exploit
ptmalloc2 allocator의 원리 및 공격하는 방법을 학습합니다.
929 150 minutes Difficult FREE
This course is opened to Enterprise. See the Enterprise introduction
Block Cipher: AES
Learn the structure of AES and the encryption process.
143 60 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Object Structure - JSArray, JSArrayBuffer
JSArray와 JSArrayBuffer의 구조를 학습합니다.
71 30 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
nc
nc를 학습합니다.
2,281 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: NoSQL Injection
Improve your understanding of NoSQL injection by solving a wargame challenge.
3,471 120 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Azure: Data Security
데이터 보안과 관련된 Azure 서비스를 소개하고, 이들을 안전하게 설정하는 방법을 학습합니다.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
V8 Typer Exploit
V8 Typer Exploit의 원리 및 방법을 학습합니다.
29 120 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
[함께 실습] Patch Chall: C Tutorial
Patch Chall: C Tutorial을 함께 풀어봅니다.
45 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
access-log
access-log
21 60 minutes Difficult FREE
This course is opened to Enterprise. See the Enterprise introduction
Mitigations
KASLR 보호 기법과 우회하는 방법을 공부합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
하드 코딩된 민감 정보
하드 코딩된 민감 정보의 유형을 학습합니다.
30 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
AWS: Data Security (v1 legacy)
데이터 보안과 관련된 AWS 서비스를 소개하고, 이들을 안전하게 설정하는 방법을 학습합니다.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-S] Background: SQL DML
SQL DML 구문에 대해서 설명합니다.
2,162 60 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: Cookie & Session
Learn how to gain administrator privileges with session information.
2,287 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Background
Linux Kernel 개론을 설명합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Linux Kernel Image
Linux Kernel Image 빌드 방법을 설명합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: File Vulnerability-2
Access the desired file via a path traversal vulnerability.
767 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
msg_msg
linux kernel exploit에 활용할 수 있는 msg_msg 객체를 알아봅니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
simple_xattr
linux kernel exploit에 활용할 수 있는 simple_xattr 객체를 알아봅니다.
30 minutes Normal ENTERPRISE
Exploit Tech: ROP x64
562 finished this course.
Background: Web
15900 finished this course.
펌웨어 분석
84 finished this course.
Regular Expressions
1529 finished this course.
전자/전기
19 finished this course.
SSH
1961 finished this course.
Classical Ciphers
626 finished this course.
Ghidra 디버거
437 finished this course.
Markdown
1015 finished this course.
V8 Exploit Technique
66 finished this course.
ServerSide: File Vulnerability
3256 finished this course.
Introduction
955 finished this course.
Digital Signatures
69 finished this course.
Number Theory 2
216 finished this course.
Coding
2728 finished this course.
Introduction
736 finished this course.
Heap Allocator Exploit
929 finished this course.
Block Cipher: AES
143 finished this course.
nc
2281 finished this course.
Exercise: NoSQL Injection
3471 finished this course.
V8 Typer Exploit
29 finished this course.
access-log
21 finished this course.
[WHA-S] Background: SQL DML
2162 finished this course.
Exercise: Cookie & Session
2287 finished this course.
Exercise: File Vulnerability-2
767 finished this course.