Digital Forensics

The Digital Forensics Roadmap focuses on learning how to collect and recover data from digital devices and analyze both the data and the systems involved.

Digital Forensics Roadmap:
This roadmap covers the fundamental concepts required for beginners in digital forensics. It includes practices using scenarios to help learners better understand and apply digital forensics techniques.

Looking for cybersecurity lectures for your organization? Train your team with Dreamhack.
All lectures from this category
All Lectures in this Category
Lecture title
Number of completed users
Average study time
Difficulty
(Click to sort ascending)
Price
This lecture is available only to Enterprise members. See the Enterprise introduction
Exploit Tech: Return to Library
Learn the principles and methods of attack techniques used for bypassing canaries and exploiting code in libraries.
2,305 people 90 minutes Easy FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
Exploit Tech: Meet-in-the-middle Attack
Learn how the meet-in-the-middle attack works.
733 people 60 minutes Very easy FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
FAT32 and NTFS File Systems
FAT32 and NTFS file systems
218 people 60 minutes Easy FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
Background: Binary
Describes what a binary is and the compilation process.
8,785 people 30 minutes Very easy FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
Exploit Tech: Length Eextension Attack
Learn how to compute another hash value from one hash value using a length extension attack on the MD5 hash function.
109 people 60 minutes Easy FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
Exploit Tech: Format String Bug
Practice format string attacks using example code with format string bug vulnerability.
1,559 people 60 minutes Easy FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
Exploit Tech: _IO_FILE Arbitrary Address Write
Learn an exploit that uses _IO_FILE to write a value to an arbitrary memory address.
498 people 90 minutes Difficult FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
Number Theory 2
You will study Fermat's little theorem, Euler's theorem, and practice with soem integer classes in SageMath.
299 people 60 minutes Easy FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
Web Hacking 101
Learn Web Hacking 101.
2,852 people 30 minutes Very easy FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
Firmware analysis
Learn firmware analysis.
105 people 60 minutes Medium
This lecture is available only to Enterprise members. See the Enterprise introduction
Registry
Windows registry
132 people 60 minutes Easy FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
Docker
Learn Docker.
2,448 people 120 minutes Easy FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
KAPE
Learn how to use KAPE
41 people 90 minutes Medium FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
Object Structure - WASM, Function
Learn the structure of WASMs and functions.
77 people 60 minutes Very Difficult
This lecture is available only to Enterprise members. See the Enterprise introduction
Background: React
Learn the essentials of React.
60 minutes Very easy ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
Electronics/Electrical
Describes electronics/electricity.
40 people 30 minutes Easy
This lecture is available only to Enterprise members. See the Enterprise introduction
string
Learn how to identify and fix string input validation issues.
90 minutes Difficult ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
URL validation
Learn how to validate and patch weak URLs.
120 minutes Difficult ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
Practice Together: Firmware Emulation Practice
Work through the Firmware Emulation Exercise together.
75 people 90 minutes Medium
This lecture is available only to Enterprise members. See the Enterprise introduction
[WHA-C] Background: Content Security Policy
Describes the Content Security Policy.
1,017 people 30 minutes Medium FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
Netcat
Learn Netcat.
2,763 people 30 minutes Very easy FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
Blockchain and smart contracts
Understand what blockchain and smart contracts are.
30 minutes Easy ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
Numbers
Learn how to identify and fix numeric input validation issues.
120 minutes Difficult ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
Exploit Tech: Storage Collision
Read the Solidity code to find and exploit a storage conflict vulnerability in the proxy contract.
60 minutes Easy ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
[WHA-C] Exploit Tech: Relative Path Overwrite
Learn the principles and methods of Relative Path Overwrite.
285 people 30 minutes Medium FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
Header
Learn the goals and organization of the C Secure Coding Roadmap.
5 minutes Very easy ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
Numeric Errors
Learn about bugs that can occur with numeric operations in Solidity contracts.
30 minutes Easy ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
Using safe libraries
Learn precautions to use the library safely.
120 minutes Difficult ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
Exploit Tech: Initializer & Selfdestruct
Read the Solidity code to find a vulnerability in the Initializer and attack it via selfdestruct.
60 minutes Easy ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
Unreliable data sources
Learn how to identify and fix issues with using data from untrusted sources.
30 minutes Difficult ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
Proxy Contracts
Learn what a proxy contract is in Smart Contracts.
30 minutes Easy ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
Syntax and characteristics of Solidity
Learn about Solidity, the leading language for writing smart contracts on Ethereum.
60 minutes Medium ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
Sender
Learn the characteristics of keywords related to sender used in Solidity contracts and the vulnerabilities associated with them.
30 minutes Easy ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
[WHA-S] Exercise: Command Injection Advanced
Solve Command Injection Advanced challenges together.
879 people 60 minutes Easy FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
Use secure JWTs
Identify issues you may encounter when using JWTs and how to fix them.
30 minutes Difficult ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
Hard-coded sensitive information
Learn the types of sensitive information that are hard-coded.
30 minutes Difficult ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
IDOR
Learn about vulnerable cases where IDOR occurs and how to patch them.
60 minutes Difficult ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
Lack of Rate Limiting
Learn the need for rate limits.
30 minutes Difficult ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
[WHA-S] Exercise: Bypass WAF
Let's unpack Bypass WAF together.
1,116 people 60 minutes Easy FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
Exposing sensitive information
Learn examples of sensitive information exposure.
30 minutes Difficult ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
Using Lock securely
Learn how to safely use Locks in the Kotlin environment.
60 minutes Difficult ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
[WHA-S] Exploit Tech: DBMS Misconfiguration
Learn the vulnerabilities that can be caused by DBMS misconfiguration.
972 people 60 minutes Medium FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
Password-related
Learn password-related vulnerabilities and how to patch them.
30 minutes Difficult ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
[WHA-S] ExploitTech: Error & Time based SQL Injection
Learn Error based SQL Injection and Time based SQL Injection.
1,677 people 60 minutes Medium FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
[WHA-S] ExploitTech: Blind SQL Injection Advanced
Learn the principles and methods of attacks that are more efficient than traditional Blind SQL Injection.
1,765 people 30 minutes Medium FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
[WHA-C] Exploit Tech: XS-Search
Learn the principles and methods of XS-Search.
617 people 30 minutes Medium FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
[WHA-S] Exercise: Blind SQL Injection Advanced
Let's walk through Blind SQL Injection Advanced together.
1,530 people 90 minutes Easy FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
Client-side vulnerabilities
Learn about XSS and CSRF.
60 minutes Very easy ENTERPRISE
This lecture is available only to Enterprise members. See the Enterprise introduction
[WHA-S] ExploitTech: DBMS Fingerprinting
Learn the principles and methods of DBMS-specific information gathering.
1,030 people 30 minutes Medium FREE
This lecture is available only to Enterprise members. See the Enterprise introduction
[WHA-S] Exercise: CouchDB
Let's unpack NoSQL-CouchDB together.
773 people 60 minutes Easy FREE
Exploit Tech: Return to Library
2305 people completed this lecture.
Exploit Tech: Meet-in-the-middle Attack
733 people completed this lecture.
FAT32 and NTFS File Systems
218 people completed this lecture.
Background: Binary
8785 people completed this lecture.
Exploit Tech: Length Eextension Attack
109 people completed this lecture.
Exploit Tech: Format String Bug
1559 people completed this lecture.
Exploit Tech: _IO_FILE Arbitrary Address Write
498 people completed this lecture.
Number Theory 2
299 people completed this lecture.
Web Hacking 101
2852 people completed this lecture.
Firmware analysis
105 people completed this lecture.
Registry
132 people completed this lecture.
Docker
2448 people completed this lecture.
KAPE
41 people completed this lecture.
Object Structure - WASM, Function
77 people completed this lecture.
Electronics/Electrical
40 people completed this lecture.
Practice Together: Firmware Emulation Practice
75 people completed this lecture.
[WHA-C] Background: Content Security Policy
1017 people completed this lecture.
Netcat
2763 people completed this lecture.
[WHA-C] Exploit Tech: Relative Path Overwrite
285 people completed this lecture.
[WHA-S] Exercise: Command Injection Advanced
879 people completed this lecture.
[WHA-S] Exercise: Bypass WAF
1116 people completed this lecture.
[WHA-S] Exploit Tech: DBMS Misconfiguration
972 people completed this lecture.
[WHA-S] ExploitTech: Blind SQL Injection Advanced
1765 people completed this lecture.
[WHA-C] Exploit Tech: XS-Search
617 people completed this lecture.
[WHA-S] Exercise: Blind SQL Injection Advanced
1530 people completed this lecture.
[WHA-S] ExploitTech: DBMS Fingerprinting
1030 people completed this lecture.
[WHA-S] Exercise: CouchDB
773 people completed this lecture.