Mobile Hacking

모바일 해킹 로드맵은 모바일 애플리케이션 점검 시 필수적으로 사용되는 동적 분석 도구인 프리다(Frida)를 활용하여 안드로이드, iOS 예제 애플리케이션에 적용되어있는 루팅, 프리다, 디버깅 탐지등 과 같은 보호 로직들을 우회하는 과정을 실습합니다.

  • 안드로이드 로드맵에서는 안드로이드 애플리케이션 점검 환경을 구성합니다. 예제 애플리케이션의 코드를 분석하고 프리다를 통해 보호 로직을 우회하는 실습을 진행합니다.

  • iOS 로드맵에서는 iOS 환경과 M1 아키텍쳐에 맞는 애플리케이션 점검 환경을 구성합니다. 제공되는 예제 애플리케이션의 코드를 분석하고 프리다를 통해 보호 로직을 우회하는 실습을 진행합니다.

Looking for cybersecurity courses for your organization? Train your team with Dreamhack.
Courses from this category
All courses in this category
Course title
Finished users
Taken time
Difficulty
(Click to sort ascending)
Price
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: ROP x64
Acquire a shell through return-oriented programming (ROP) techniques in the x64 environment.
741 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Storage
Solidity 코드를 읽고 컨트랙트의 스토리지로부터 값을 읽어와 문제를 풀어봅니다.
60 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Background: Web
In this lecture, you'll learn about the web and its components.
16,851 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
DreamBank - 커뮤니티 / 고객센터 서비스 (Community)
DreamBank의 커뮤니티 / 고객센터 서비스(Community)에서 문제점을 찾고 패치하는 방법을 학습합니다.
150 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Regular Expressions
Learn regular expressions.
1,805 30 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Introduction
Linux Kernel 로드맵의 목표와 구성을 알아봅니다.
15 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
SSP
SSP 보호 기법에 대해 공부합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
펌웨어 분석
펌웨어 분석을 학습합니다.
97 60 minutes Normal
This course is opened to Enterprise. See the Enterprise introduction
전자/전기
전자/전기에 대해서 설명합니다.
32 30 minutes Easy
This course is opened to Enterprise. See the Enterprise introduction
SSH
Learn SSH.
2,213 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Classical Ciphers
Learn the types of classic ciphers and how to attack them simply.
798 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Ghidra 디버거
Ghidra 디버거를 학습합니다.
465 150 minutes Easy
This course is opened to Enterprise. See the Enterprise introduction
Markdown
Learn Markdown syntax.
1,170 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Background: Cloud
클라우드 기술과 클라우드의 보안에 대해 간단히 설명합니다.
30 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
숫자
숫자 입력값 검증 문제 확인 및 수정 방안을 학습합니다.
120 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
암호 관련
암호 관련 취약점과 패치 방법을 학습합니다.
30 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
V8 Exploit Technique
V8 Exploit의 원리 및 방법을 학습합니다.
76 90 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
Exercise: Patch Chall - Kotlin Spring
Solve 'Patch Chall - Kotlin Spring'.
60 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
ServerSide: File Vulnerability
Learn server-side attacks: file uploads and downloads.
3,439 90 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
문자열
문자열 입력값 검증 문제 확인 및 수정 방안을 학습합니다.
90 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
안전한 라이브러리 사용법
라이브러리를 안전하기 사용하기 위한 주의사항을 학습합니다.
120 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Introduction
Learn about the goals and objectives of the cryptography roadmap and the topics it covers.
1,200 15 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Digital Signatures
Introduce the concept of digital signatures and learn the mathematical principles of different digital signatures.
85 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
블록체인과 스마트 컨트랙트
블록체인과 스마트 컨트랙트가 어떤 개념인지 이해합니다.
30 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Azure: Network
네트워크와 관련된 Azure 서비스를 소개하고, 이들을 안전하게 설정하는 방법을 학습합니다.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-C] Background: Content Security Policy
Describes the Content Security Policy.
966 30 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
Number Theory 2
You will study Fermat's little theorem, Euler's theorem, and practice with soem integer classes in SageMath.
258 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Coding
Learn the basics of coding.
3,063 120 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Signature without Hashing
Learn why DSA signatures require a secure hash function.
69 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Introduction
Ghidra 로드맵의 목표와 구성을 알아봅니다.
793 15 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Heap Allocator Exploit
ptmalloc2 allocator의 원리 및 공격하는 방법을 학습합니다.
957 150 minutes Difficult FREE
This course is opened to Enterprise. See the Enterprise introduction
Object Structure - JSArray, JSArrayBuffer
JSArray와 JSArrayBuffer의 구조를 학습합니다.
80 30 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
nc
nc를 학습합니다.
2,558 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: NoSQL Injection
Improve your understanding of NoSQL injection by solving a wargame challenge.
3,654 120 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Azure: Data Security
데이터 보안과 관련된 Azure 서비스를 소개하고, 이들을 안전하게 설정하는 방법을 학습합니다.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
V8 Typer Exploit
V8 Typer Exploit의 원리 및 방법을 학습합니다.
31 120 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
Block Cipher: AES
Learn the structure of AES and the encryption process.
185 60 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
access-log
access-log
183 60 minutes Difficult FREE
This course is opened to Enterprise. See the Enterprise introduction
Mitigations
KASLR 보호 기법과 우회하는 방법을 공부합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[함께 실습] Patch Chall: C Tutorial
Patch Chall: C Tutorial을 함께 풀어봅니다.
45 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
하드 코딩된 민감 정보
하드 코딩된 민감 정보의 유형을 학습합니다.
30 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-S] Background: SQL DML
SQL DML 구문에 대해서 설명합니다.
2,294 60 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: Cookie & Session
Learn how to gain administrator privileges with session information.
2,842 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Background
Linux Kernel 개론을 설명합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Linux Kernel Image
Linux Kernel Image 빌드 방법을 설명합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: File Vulnerability-2
Access the desired file via a path traversal vulnerability.
920 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
msg_msg
linux kernel exploit에 활용할 수 있는 msg_msg 객체를 알아봅니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
simple_xattr
linux kernel exploit에 활용할 수 있는 simple_xattr 객체를 알아봅니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Find the USB
Find the USB
97 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: CSRF-2
Learn how to use CSRF attack techniques to gain administrator privileges.
1,686 30 minutes Very easy FREE
Exploit Tech: ROP x64
741 finished this course.
Background: Web
16851 finished this course.
Regular Expressions
1805 finished this course.
펌웨어 분석
97 finished this course.
전자/전기
32 finished this course.
SSH
2213 finished this course.
Classical Ciphers
798 finished this course.
Ghidra 디버거
465 finished this course.
Markdown
1170 finished this course.
V8 Exploit Technique
76 finished this course.
ServerSide: File Vulnerability
3439 finished this course.
Introduction
1200 finished this course.
Digital Signatures
85 finished this course.
Number Theory 2
258 finished this course.
Coding
3063 finished this course.
Introduction
793 finished this course.
Heap Allocator Exploit
957 finished this course.
nc
2558 finished this course.
Exercise: NoSQL Injection
3654 finished this course.
V8 Typer Exploit
31 finished this course.
Block Cipher: AES
185 finished this course.
access-log
183 finished this course.
[WHA-S] Background: SQL DML
2294 finished this course.
Exercise: Cookie & Session
2842 finished this course.
Exercise: File Vulnerability-2
920 finished this course.
Find the USB
97 finished this course.
Exercise: CSRF-2
1686 finished this course.