Hardware

하드웨어 로드맵은 IoT와 같은 환경의 하드웨어 및 시스템에 대한 동작 원리와 설계를 이해하며, 해당 환경을 분석하고 취약점을 찾는 방식을 실습합니다.

  • 임베디드 로드맵은 Arm 환경에서 동작하는 펌웨어를 분석합니다. 예제 펌웨어를 분석하고 에뮬레이션, 디버깅 등을 통해 동작 방식과 취약점을 파악하는 실습을 진행합니다.
Looking for cybersecurity courses for your organization? Train your team with Dreamhack.
Courses from this category
All courses in this category
Course title
Finished users
Taken time
Difficulty
(Click to sort ascending)
Price
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: ROP x64
Acquire a shell through return-oriented programming (ROP) techniques in the x64 environment.
738 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Storage
Solidity 코드를 읽고 컨트랙트의 스토리지로부터 값을 읽어와 문제를 풀어봅니다.
60 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Background: Web
In this lecture, you'll learn about the web and its components.
16,833 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
DreamBank - 커뮤니티 / 고객센터 서비스 (Community)
DreamBank의 커뮤니티 / 고객센터 서비스(Community)에서 문제점을 찾고 패치하는 방법을 학습합니다.
150 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Regular Expressions
Learn regular expressions.
1,797 30 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Introduction
Linux Kernel 로드맵의 목표와 구성을 알아봅니다.
15 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
SSP
SSP 보호 기법에 대해 공부합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
펌웨어 분석
펌웨어 분석을 학습합니다.
97 60 minutes Normal
This course is opened to Enterprise. See the Enterprise introduction
전자/전기
전자/전기에 대해서 설명합니다.
32 30 minutes Easy
This course is opened to Enterprise. See the Enterprise introduction
SSH
Learn SSH.
2,207 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Classical Ciphers
Learn the types of classic ciphers and how to attack them simply.
793 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Ghidra 디버거
Ghidra 디버거를 학습합니다.
465 150 minutes Easy
This course is opened to Enterprise. See the Enterprise introduction
Markdown
Learn Markdown syntax.
1,168 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Background: Cloud
클라우드 기술과 클라우드의 보안에 대해 간단히 설명합니다.
30 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
숫자
숫자 입력값 검증 문제 확인 및 수정 방안을 학습합니다.
120 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
암호 관련
암호 관련 취약점과 패치 방법을 학습합니다.
30 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
V8 Exploit Technique
V8 Exploit의 원리 및 방법을 학습합니다.
76 90 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
Exercise: Patch Chall - Kotlin Spring
Solve 'Patch Chall - Kotlin Spring'.
60 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
ServerSide: File Vulnerability
Learn server-side attacks: file uploads and downloads.
3,438 90 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
문자열
문자열 입력값 검증 문제 확인 및 수정 방안을 학습합니다.
90 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
안전한 라이브러리 사용법
라이브러리를 안전하기 사용하기 위한 주의사항을 학습합니다.
120 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Introduction
Learn about the goals and objectives of the cryptography roadmap and the topics it covers.
1,191 15 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Digital Signatures
Introduce the concept of digital signatures and learn the mathematical principles of different digital signatures.
85 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
블록체인과 스마트 컨트랙트
블록체인과 스마트 컨트랙트가 어떤 개념인지 이해합니다.
30 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Azure: Network
네트워크와 관련된 Azure 서비스를 소개하고, 이들을 안전하게 설정하는 방법을 학습합니다.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-C] Background: Content Security Policy
Describes the Content Security Policy.
966 30 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
Number Theory 2
You will study Fermat's little theorem, Euler's theorem, and practice with soem integer classes in SageMath.
258 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Coding
Learn the basics of coding.
3,056 120 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Signature without Hashing
Learn why DSA signatures require a secure hash function.
69 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Introduction
Ghidra 로드맵의 목표와 구성을 알아봅니다.
792 15 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Heap Allocator Exploit
ptmalloc2 allocator의 원리 및 공격하는 방법을 학습합니다.
955 150 minutes Difficult FREE
This course is opened to Enterprise. See the Enterprise introduction
Object Structure - JSArray, JSArrayBuffer
JSArray와 JSArrayBuffer의 구조를 학습합니다.
79 30 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
nc
nc를 학습합니다.
2,554 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: NoSQL Injection
Improve your understanding of NoSQL injection by solving a wargame challenge.
3,652 120 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Azure: Data Security
데이터 보안과 관련된 Azure 서비스를 소개하고, 이들을 안전하게 설정하는 방법을 학습합니다.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
V8 Typer Exploit
V8 Typer Exploit의 원리 및 방법을 학습합니다.
31 120 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
Block Cipher: AES
Learn the structure of AES and the encryption process.
185 60 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
access-log
access-log
182 60 minutes Difficult FREE
This course is opened to Enterprise. See the Enterprise introduction
Mitigations
KASLR 보호 기법과 우회하는 방법을 공부합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[함께 실습] Patch Chall: C Tutorial
Patch Chall: C Tutorial을 함께 풀어봅니다.
45 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
하드 코딩된 민감 정보
하드 코딩된 민감 정보의 유형을 학습합니다.
30 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-S] Background: SQL DML
SQL DML 구문에 대해서 설명합니다.
2,291 60 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: Cookie & Session
Learn how to gain administrator privileges with session information.
2,829 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Background
Linux Kernel 개론을 설명합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Linux Kernel Image
Linux Kernel Image 빌드 방법을 설명합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: File Vulnerability-2
Access the desired file via a path traversal vulnerability.
920 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
msg_msg
linux kernel exploit에 활용할 수 있는 msg_msg 객체를 알아봅니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
simple_xattr
linux kernel exploit에 활용할 수 있는 simple_xattr 객체를 알아봅니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Find the USB
Find the USB
96 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: CSRF-2
Learn how to use CSRF attack techniques to gain administrator privileges.
1,681 30 minutes Very easy FREE
Exploit Tech: ROP x64
738 finished this course.
Background: Web
16833 finished this course.
Regular Expressions
1797 finished this course.
펌웨어 분석
97 finished this course.
전자/전기
32 finished this course.
SSH
2207 finished this course.
Classical Ciphers
793 finished this course.
Ghidra 디버거
465 finished this course.
Markdown
1168 finished this course.
V8 Exploit Technique
76 finished this course.
ServerSide: File Vulnerability
3438 finished this course.
Introduction
1191 finished this course.
Digital Signatures
85 finished this course.
Number Theory 2
258 finished this course.
Coding
3056 finished this course.
Introduction
792 finished this course.
Heap Allocator Exploit
955 finished this course.
nc
2554 finished this course.
Exercise: NoSQL Injection
3652 finished this course.
V8 Typer Exploit
31 finished this course.
Block Cipher: AES
185 finished this course.
access-log
182 finished this course.
[WHA-S] Background: SQL DML
2291 finished this course.
Exercise: Cookie & Session
2829 finished this course.
Exercise: File Vulnerability-2
920 finished this course.
Find the USB
96 finished this course.
Exercise: CSRF-2
1681 finished this course.