Roadmaps for you
Recommended Roadmaps

Lectures that your followings took
Recommendations based on your followings

Lectures for you
Recommended Lectures

All roadmaps provided by Dreamhack
All Roadmaps 
Looking for cybersecurity lectures for your organization? Train your team with Dreamhack.
All lectures provided by Dreamhack
All Lectures

Lecture title | Number of completed users | Average study time | Difficulty (Click to sort ascending) | Price | |
---|---|---|---|---|---|
Exploit Tech: Return to Library
Learn the principles and methods of attack techniques used for bypassing canaries and exploiting code in libraries.
| 2,355 people | 90 minutes | Easy | FREE | |
Exploit Tech: Meet-in-the-middle Attack
Learn how the meet-in-the-middle attack works.
| 780 people | 60 minutes | Very easy | FREE | |
FAT32 and NTFS File Systems
FAT32 and NTFS file systems
| 254 people | 60 minutes | Easy | FREE | |
Background: Binary
Describes what a binary is and the compilation process.
| 8,905 people | 30 minutes | Very easy | FREE | |
Exploit Tech: Length Eextension Attack
Learn how to compute another hash value from one hash value using a length extension attack on the MD5 hash function.
| 114 people | 60 minutes | Easy | FREE | |
Exploit Tech: Format String Bug
Practice format string attacks using example code with format string bug vulnerability.
| 1,590 people | 60 minutes | Easy | FREE | |
Exploit Tech: _IO_FILE Arbitrary Address Write
Learn an exploit that uses _IO_FILE to write a value to an arbitrary memory address.
| 517 people | 90 minutes | Difficult | FREE | |
Number Theory 2
You will study Fermat's little theorem, Euler's theorem, and practice with soem integer classes in SageMath.
| 319 people | 60 minutes | Easy | FREE | |
Web Hacking 101
Learn Web Hacking 101.
| 2,978 people | 30 minutes | Very easy | FREE | |
ClientSide: CSRF
Learn CSRF, a client-side attack.
| 6,236 people | 60 minutes | Easy | FREE | |
Exercise: Blind SQL Injection
Improve your understanding of blind SQL injection by solving a wargame challenge.
| 4,299 people | 120 minutes | Easy | FREE | |
Firmware analysis
Learn firmware analysis.
| 114 people | 60 minutes | Medium | PAID | |
Registry
Windows registry
| 151 people | 60 minutes | Easy | FREE | |
Docker
Learn Docker.
| 2,522 people | 120 minutes | Easy | FREE | |
KAPE
Learn how to use KAPE
| 46 people | 90 minutes | Medium | FREE | |
Object Structure - WASM, Function
Learn the structure of WASMs and functions.
| 78 people | 60 minutes | Very Difficult | PAID | |
Background: React
Learn the essentials of React.
| 60 minutes | Very easy | ENTERPRISE | ||
Electronics/Electrical
Describes electronics/electricity.
| 44 people | 30 minutes | Easy | PAID | |
string
Learn how to identify and fix string input validation issues.
| 90 minutes | Difficult | ENTERPRISE | ||
URL validation
Learn how to validate and patch weak URLs.
| 120 minutes | Difficult | ENTERPRISE | ||
Practice Together: Firmware Emulation Practice
Work through the Firmware Emulation Exercise together.
| 83 people | 90 minutes | Medium | PAID | |
[WHA-C] Background: Content Security Policy
Describes the Content Security Policy.
| 1,028 people | 30 minutes | Medium | FREE | |
Netcat
Learn Netcat.
| 2,855 people | 30 minutes | Very easy | FREE | |
Blockchain and smart contracts
Understand what blockchain and smart contracts are.
| 30 minutes | Easy | ENTERPRISE | ||
Numbers
Learn how to identify and fix numeric input validation issues.
| 120 minutes | Difficult | ENTERPRISE | ||
Exploit Tech: Storage Collision
Read the Solidity code to find and exploit a storage conflict vulnerability in the proxy contract.
| 60 minutes | Easy | ENTERPRISE | ||
[WHA-C] Exploit Tech: Relative Path Overwrite
Learn the principles and methods of Relative Path Overwrite.
| 295 people | 30 minutes | Medium | FREE | |
Header
Learn the goals and organization of the C Secure Coding Roadmap.
| 5 minutes | Very easy | ENTERPRISE | ||
Numeric Errors
Learn about bugs that can occur with numeric operations in Solidity contracts.
| 30 minutes | Easy | ENTERPRISE | ||
Using safe libraries
Learn precautions to use the library safely.
| 120 minutes | Difficult | ENTERPRISE | ||
Exploit Tech: Initializer & Selfdestruct
Read the Solidity code to find a vulnerability in the Initializer and attack it via selfdestruct.
| 60 minutes | Easy | ENTERPRISE | ||
Unreliable data sources
Learn how to identify and fix issues with using data from untrusted sources.
| 30 minutes | Difficult | ENTERPRISE | ||
Proxy Contracts
Learn what a proxy contract is in Smart Contracts.
| 30 minutes | Easy | ENTERPRISE | ||
Syntax and characteristics of Solidity
Learn about Solidity, the leading language for writing smart contracts on Ethereum.
| 60 minutes | Medium | ENTERPRISE | ||
Sender
Learn the characteristics of keywords related to sender used in Solidity contracts and the vulnerabilities associated with them.
| 30 minutes | Easy | ENTERPRISE | ||
[WHA-S] Exercise: Command Injection Advanced
Solve Command Injection Advanced challenges together.
| 886 people | 60 minutes | Easy | FREE | |
Use secure JWTs
Identify issues you may encounter when using JWTs and how to fix them.
| 30 minutes | Difficult | ENTERPRISE | ||
Hard-coded sensitive information
Learn the types of sensitive information that are hard-coded.
| 30 minutes | Difficult | ENTERPRISE | ||
IDOR
Learn about vulnerable cases where IDOR occurs and how to patch them.
| 60 minutes | Difficult | ENTERPRISE | ||
Lack of Rate Limiting
Learn the need for rate limits.
| 30 minutes | Difficult | ENTERPRISE | ||
[WHA-S] Exercise: Bypass WAF
Let's unpack Bypass WAF together.
| 1,125 people | 60 minutes | Easy | FREE | |
Exposing sensitive information
Learn examples of sensitive information exposure.
| 30 minutes | Difficult | ENTERPRISE | ||
Using Lock securely
Learn how to safely use Locks in the Kotlin environment.
| 60 minutes | Difficult | ENTERPRISE | ||
[WHA-S] Exploit Tech: DBMS Misconfiguration
Learn the vulnerabilities that can be caused by DBMS misconfiguration.
| 981 people | 60 minutes | Medium | FREE | |
Password-related
Learn password-related vulnerabilities and how to patch them.
| 30 minutes | Difficult | ENTERPRISE | ||
[WHA-S] ExploitTech: Error & Time based SQL Injection
Learn Error based SQL Injection and Time based SQL Injection.
| 1,696 people | 60 minutes | Medium | FREE | |
[WHA-S] ExploitTech: Blind SQL Injection Advanced
Learn the principles and methods of attacks that are more efficient than traditional Blind SQL Injection.
| 1,784 people | 30 minutes | Medium | FREE | |
[WHA-C] Exploit Tech: XS-Search
Learn the principles and methods of XS-Search.
| 623 people | 30 minutes | Medium | FREE | |
[WHA-S] Exercise: Blind SQL Injection Advanced
Let's walk through Blind SQL Injection Advanced together.
| 1,551 people | 90 minutes | Easy | FREE | |
Client-side vulnerabilities
Learn about XSS and CSRF.
| 60 minutes | Very easy | ENTERPRISE |
Exploit Tech: Return to Library
2355
people completed this lecture.
Exploit Tech: Meet-in-the-middle Attack
780
people completed this lecture.
FAT32 and NTFS File Systems
254
people completed this lecture.
Background: Binary
8905
people completed this lecture.
Exploit Tech: Length Eextension Attack
114
people completed this lecture.
Exploit Tech: Format String Bug
1590
people completed this lecture.
Exploit Tech: _IO_FILE Arbitrary Address Write
517
people completed this lecture.
Number Theory 2
319
people completed this lecture.
Web Hacking 101
2978
people completed this lecture.
ClientSide: CSRF
6236
people completed this lecture.
Exercise: Blind SQL Injection
4299
people completed this lecture.
Firmware analysis
114
people completed this lecture.
Registry
151
people completed this lecture.
Docker
2522
people completed this lecture.
KAPE
46
people completed this lecture.
Object Structure - WASM, Function
78
people completed this lecture.
Electronics/Electrical
44
people completed this lecture.
Practice Together: Firmware Emulation Practice
83
people completed this lecture.
[WHA-C] Background: Content Security Policy
1028
people completed this lecture.
Netcat
2855
people completed this lecture.
[WHA-C] Exploit Tech: Relative Path Overwrite
295
people completed this lecture.
[WHA-S] Exercise: Command Injection Advanced
886
people completed this lecture.
[WHA-S] Exercise: Bypass WAF
1125
people completed this lecture.
[WHA-S] Exploit Tech: DBMS Misconfiguration
981
people completed this lecture.
[WHA-S] ExploitTech: Error & Time based SQL Injection
1696
people completed this lecture.
[WHA-S] ExploitTech: Blind SQL Injection Advanced
1784
people completed this lecture.
[WHA-C] Exploit Tech: XS-Search
623
people completed this lecture.
[WHA-S] Exercise: Blind SQL Injection Advanced
1551
people completed this lecture.