Choose category
비기너즈
시스템해킹
리버싱
웹해킹
암호학
모바일해킹
클라우드
블록체인
시큐어코딩
하드웨어
디지털포렌식
All roadmaps provided by Dreamhack.
Roadmaps
Looking for cybersecurity courses for your organization? Train your team with Dreamhack.
All courses provided by Dreamhack.
All courses
Course title
Finished users
Taken time
Difficulty
(Click to sort ascending)
Price
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: ROP x64
Acquire a shell through return-oriented programming (ROP) techniques in the x64 environment.
635 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Storage
Solidity 코드를 읽고 컨트랙트의 스토리지로부터 값을 읽어와 문제를 풀어봅니다.
60 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Background: Web
In this lecture, you'll learn about the web and its components.
16,353 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
펌웨어 분석
펌웨어 분석을 학습합니다.
94 60 minutes Normal
This course is opened to Enterprise. See the Enterprise introduction
DreamBank - 커뮤니티 / 고객센터 서비스 (Community)
DreamBank의 커뮤니티 / 고객센터 서비스(Community)에서 문제점을 찾고 패치하는 방법을 학습합니다.
150 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Regular Expressions
Learn regular expressions.
1,660 30 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Meet-in-the-middle Attack
Learn how the meet-in-the-middle attack works.
571 60 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Introduction
Linux Kernel 로드맵의 목표와 구성을 알아봅니다.
15 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
전자/전기
전자/전기에 대해서 설명합니다.
28 30 minutes Easy
This course is opened to Enterprise. See the Enterprise introduction
SSP
SSP 보호 기법에 대해 공부합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
SSH
Learn SSH.
2,084 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Classical Ciphers
Learn the types of classic ciphers and how to attack them simply.
696 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Ghidra 디버거
Ghidra 디버거를 학습합니다.
461 150 minutes Easy
This course is opened to Enterprise. See the Enterprise introduction
Markdown
Learn Markdown syntax.
1,093 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Background: Cloud
클라우드 기술과 클라우드의 보안에 대해 간단히 설명합니다.
30 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
숫자
숫자 입력값 검증 문제 확인 및 수정 방안을 학습합니다.
120 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
암호 관련
암호 관련 취약점과 패치 방법을 학습합니다.
30 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
V8 Exploit Technique
V8 Exploit의 원리 및 방법을 학습합니다.
70 90 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
Exercise: Patch Chall - Kotlin Spring
Solve 'Patch Chall - Kotlin Spring'.
60 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
ServerSide: File Vulnerability
Learn server-side attacks: file uploads and downloads.
3,349 90 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
문자열
문자열 입력값 검증 문제 확인 및 수정 방안을 학습합니다.
90 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
안전한 라이브러리 사용법
라이브러리를 안전하기 사용하기 위한 주의사항을 학습합니다.
120 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Introduction
Learn about the goals and objectives of the cryptography roadmap and the topics it covers.
1,059 15 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Digital Signatures
Introduce the concept of digital signatures and learn the mathematical principles of different digital signatures.
75 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
블록체인과 스마트 컨트랙트
블록체인과 스마트 컨트랙트가 어떤 개념인지 이해합니다.
30 minutes Easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Azure: Network
네트워크와 관련된 Azure 서비스를 소개하고, 이들을 안전하게 설정하는 방법을 학습합니다.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-C] Background: Content Security Policy
Describes the Content Security Policy.
943 30 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
Number Theory 2
You will study Fermat's little theorem, Euler's theorem, and practice with soem integer classes in SageMath.
228 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Coding
Learn the basics of coding.
2,898 120 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exploit Tech: Signature without Hashing
Learn why DSA signatures require a secure hash function.
59 60 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Introduction
Ghidra 로드맵의 목표와 구성을 알아봅니다.
765 15 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Heap Allocator Exploit
ptmalloc2 allocator의 원리 및 공격하는 방법을 학습합니다.
939 150 minutes Difficult FREE
This course is opened to Enterprise. See the Enterprise introduction
Object Structure - JSArray, JSArrayBuffer
JSArray와 JSArrayBuffer의 구조를 학습합니다.
76 30 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
nc
nc를 학습합니다.
2,423 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: NoSQL Injection
Improve your understanding of NoSQL injection by solving a wargame challenge.
3,580 120 minutes Easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Azure: Data Security
데이터 보안과 관련된 Azure 서비스를 소개하고, 이들을 안전하게 설정하는 방법을 학습합니다.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
V8 Typer Exploit
V8 Typer Exploit의 원리 및 방법을 학습합니다.
30 120 minutes Very Difficult
This course is opened to Enterprise. See the Enterprise introduction
Block Cipher: AES
Learn the structure of AES and the encryption process.
158 60 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
access-log
access-log
129 60 minutes Difficult FREE
This course is opened to Enterprise. See the Enterprise introduction
Mitigations
KASLR 보호 기법과 우회하는 방법을 공부합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[함께 실습] Patch Chall: C Tutorial
Patch Chall: C Tutorial을 함께 풀어봅니다.
45 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
하드 코딩된 민감 정보
하드 코딩된 민감 정보의 유형을 학습합니다.
30 minutes Difficult ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
AWS: Data Security (v1 legacy)
데이터 보안과 관련된 AWS 서비스를 소개하고, 이들을 안전하게 설정하는 방법을 학습합니다.
60 minutes Very easy ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
[WHA-S] Background: SQL DML
SQL DML 구문에 대해서 설명합니다.
2,224 60 minutes Normal FREE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: Cookie & Session
Learn how to gain administrator privileges with session information.
2,593 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
Background
Linux Kernel 개론을 설명합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Linux Kernel Image
Linux Kernel Image 빌드 방법을 설명합니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
Exercise: File Vulnerability-2
Access the desired file via a path traversal vulnerability.
841 30 minutes Very easy FREE
This course is opened to Enterprise. See the Enterprise introduction
msg_msg
linux kernel exploit에 활용할 수 있는 msg_msg 객체를 알아봅니다.
30 minutes Normal ENTERPRISE
This course is opened to Enterprise. See the Enterprise introduction
simple_xattr
linux kernel exploit에 활용할 수 있는 simple_xattr 객체를 알아봅니다.
30 minutes Normal ENTERPRISE
Exploit Tech: ROP x64
635 finished this course.
Background: Web
16353 finished this course.
펌웨어 분석
94 finished this course.
Regular Expressions
1660 finished this course.
전자/전기
28 finished this course.
SSH
2084 finished this course.
Classical Ciphers
696 finished this course.
Ghidra 디버거
461 finished this course.
Markdown
1093 finished this course.
V8 Exploit Technique
70 finished this course.
ServerSide: File Vulnerability
3349 finished this course.
Introduction
1059 finished this course.
Digital Signatures
75 finished this course.
Number Theory 2
228 finished this course.
Coding
2898 finished this course.
Introduction
765 finished this course.
Heap Allocator Exploit
939 finished this course.
nc
2423 finished this course.
Exercise: NoSQL Injection
3580 finished this course.
V8 Typer Exploit
30 finished this course.
Block Cipher: AES
158 finished this course.
access-log
129 finished this course.
[WHA-S] Background: SQL DML
2224 finished this course.
Exercise: Cookie & Session
2593 finished this course.
Exercise: File Vulnerability-2
841 finished this course.