Reverse Engineering

리버스 엔지니어링 로드맵은 소프트웨어나 시스템의 내부 구조와 기능을 분석하며, 원래의 설계 정보나 소스 코드를 재구성하는 과정을 깊게 탐색합니다.
다양한 도구와 기법을 활용하여 컴파일된 프로그램의 작동 원리를 이해합니다. 이 과정에서 원래의 코드나 설계 의도를 추론하며, 복잡한 시스템을 분해하여 효과적으로 분석하는 능력을 키우게 됩니다.

  • 리버스 엔지니어링 로드맵에서는 프로그램 분석을 위한 여러 도구 사용법과, 프로그램을 이해하기 위한 어셈블리 기초를 학습합니다.
  • 기드라 로드맵에서는 오픈 소스 도구인 Ghidra를 활용하는 방법에 대해 심도 있게 배우고 이를 실습해 보는 과정을 수행합니다.
Looking for cybersecurity courses for your organization? Train your team with Dreamhack.
Courses from this category
All courses in this category
Course title
Finished users
Taken time
Difficulty
(Click to sort ascending)
Price
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: ROP x64
Acquire a shell through return-oriented programming (ROP) techniques in the x64 environment.
741 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Storage
Solidity 코드를 읽고 컨트랙트의 스토리지로부터 값을 읽어와 문제를 풀어봅니다.
60 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Background: Web
In this lecture, you'll learn about the web and its components.
16,851 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
DreamBank - 커뮤니티 / 고객센터 서비스 (Community)
DreamBank의 커뮤니티 / 고객센터 서비스(Community)에서 문제점을 찾고 패치하는 방법을 학습합니다.
150 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Regular Expressions
Learn regular expressions.
1,805 30 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Introduction
Linux Kernel 로드맵의 목표와 구성을 알아봅니다.
15 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
SSP
SSP 보호 기법에 대해 공부합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
펌웨어 분석
펌웨어 분석을 학습합니다.
97 60 minutes Normal
This course is opened to Enterprise. See the Enterprise introduction
전자/전기
전자/전기에 대해서 설명합니다.
32 30 minutes Easy
This course is opened to Enterprise. See the Enterprise introduction
SSH
Learn SSH.
2,213 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Classical Ciphers
Learn the types of classic ciphers and how to attack them simply.
798 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Ghidra 디버거
Ghidra 디버거를 학습합니다.
465 150 minutes Easy
This course is opened to Enterprise. See the Enterprise introduction
Markdown
Learn Markdown syntax.
1,170 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Background: Cloud
클라우드 기술과 클라우드의 보안에 대해 간단히 설명합니다.
30 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
숫자
숫자 입력값 검증 문제 확인 및 수정 방안을 학습합니다.
120 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
암호 관련
암호 관련 취약점과 패치 방법을 학습합니다.
30 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
V8 Exploit Technique
V8 Exploit의 원리 및 방법을 학습합니다.
76 90 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
Exercise: Patch Chall - Kotlin Spring
Solve 'Patch Chall - Kotlin Spring'.
60 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
ServerSide: File Vulnerability
Learn server-side attacks: file uploads and downloads.
3,439 90 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
문자열
문자열 입력값 검증 문제 확인 및 수정 방안을 학습합니다.
90 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
안전한 라이브러리 사용법
라이브러리를 안전하기 사용하기 위한 주의사항을 학습합니다.
120 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Introduction
Learn about the goals and objectives of the cryptography roadmap and the topics it covers.
1,200 15 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Digital Signatures
Introduce the concept of digital signatures and learn the mathematical principles of different digital signatures.
85 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
블록체인과 스마트 컨트랙트
블록체인과 스마트 컨트랙트가 어떤 개념인지 이해합니다.
30 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Azure: Network
네트워크와 관련된 Azure 서비스를 소개하고, 이들을 안전하게 설정하는 방법을 학습합니다.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-C] Background: Content Security Policy
Describes the Content Security Policy.
966 30 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
Number Theory 2
You will study Fermat's little theorem, Euler's theorem, and practice with soem integer classes in SageMath.
258 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Coding
Learn the basics of coding.
3,063 120 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Signature without Hashing
Learn why DSA signatures require a secure hash function.
69 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Introduction
Ghidra 로드맵의 목표와 구성을 알아봅니다.
793 15 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Heap Allocator Exploit
ptmalloc2 allocator의 원리 및 공격하는 방법을 학습합니다.
957 150 minutes Difficult FREE
This course is opened to Enterprise. See the Enterprise introduction
Object Structure - JSArray, JSArrayBuffer
JSArray와 JSArrayBuffer의 구조를 학습합니다.
80 30 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
nc
nc를 학습합니다.
2,558 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: NoSQL Injection
Improve your understanding of NoSQL injection by solving a wargame challenge.
3,654 120 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Azure: Data Security
데이터 보안과 관련된 Azure 서비스를 소개하고, 이들을 안전하게 설정하는 방법을 학습합니다.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
V8 Typer Exploit
V8 Typer Exploit의 원리 및 방법을 학습합니다.
31 120 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
Block Cipher: AES
Learn the structure of AES and the encryption process.
185 60 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
access-log
access-log
183 60 minutes Difficult FREE
This course is opened to Enterprise. See the Enterprise introduction
Mitigations
KASLR 보호 기법과 우회하는 방법을 공부합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[함께 실습] Patch Chall: C Tutorial
Patch Chall: C Tutorial을 함께 풀어봅니다.
45 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
하드 코딩된 민감 정보
하드 코딩된 민감 정보의 유형을 학습합니다.
30 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-S] Background: SQL DML
SQL DML 구문에 대해서 설명합니다.
2,294 60 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: Cookie & Session
Learn how to gain administrator privileges with session information.
2,841 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Background
Linux Kernel 개론을 설명합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Linux Kernel Image
Linux Kernel Image 빌드 방법을 설명합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: File Vulnerability-2
Access the desired file via a path traversal vulnerability.
920 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
msg_msg
linux kernel exploit에 활용할 수 있는 msg_msg 객체를 알아봅니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
simple_xattr
linux kernel exploit에 활용할 수 있는 simple_xattr 객체를 알아봅니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Find the USB
Find the USB
97 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: CSRF-2
Learn how to use CSRF attack techniques to gain administrator privileges.
1,686 30 minutes Very easy FREE
Exploit Tech: ROP x64
741 finished this course.
Background: Web
16851 finished this course.
Regular Expressions
1805 finished this course.
펌웨어 분석
97 finished this course.
전자/전기
32 finished this course.
SSH
2213 finished this course.
Classical Ciphers
798 finished this course.
Ghidra 디버거
465 finished this course.
Markdown
1170 finished this course.
V8 Exploit Technique
76 finished this course.
ServerSide: File Vulnerability
3439 finished this course.
Introduction
1200 finished this course.
Digital Signatures
85 finished this course.
Number Theory 2
258 finished this course.
Coding
3063 finished this course.
Introduction
793 finished this course.
Heap Allocator Exploit
957 finished this course.
nc
2558 finished this course.
Exercise: NoSQL Injection
3654 finished this course.
V8 Typer Exploit
31 finished this course.
Block Cipher: AES
185 finished this course.
access-log
183 finished this course.
[WHA-S] Background: SQL DML
2294 finished this course.
Exercise: Cookie & Session
2841 finished this course.
Exercise: File Vulnerability-2
920 finished this course.
Find the USB
97 finished this course.
Exercise: CSRF-2
1686 finished this course.