Roadmaps for you
Recommended Roadmaps

Lectures that your followings took
Recommendations based on your followings

Lectures for you
Recommended Lectures

All roadmaps provided by Dreamhack
All Roadmaps 
Looking for cybersecurity lectures for your organization? Train your team with Dreamhack.
All lectures provided by Dreamhack
All Lectures

Lecture title | Number of completed users | Average study time | Difficulty (Click to sort ascending) | Price | |
---|---|---|---|---|---|
[WHA-S] Background: SQL DML
Describes the SQL DML syntax.
| 2,533 people | 60 minutes | Medium | FREE | |
Exploit Tech: Meet-in-the-middle Attack
Learn how the meet-in-the-middle attack works.
| 915 people | 60 minutes | Very easy | FREE | |
FAT32 and NTFS File Systems
FAT32 and NTFS file systems
| 314 people | 60 minutes | Easy | FREE | |
Exploit Tech: Length Eextension Attack
Learn how to compute another hash value from one hash value using a length extension attack on the MD5 hash function.
| 133 people | 60 minutes | Easy | FREE | |
Exploit Tech: Format String Bug
Practice format string attacks using example code with format string bug vulnerability.
| 1,645 people | 60 minutes | Easy | FREE | |
Exploit Tech: _IO_FILE Arbitrary Address Write
Learn an exploit that uses _IO_FILE to write a value to an arbitrary memory address.
| 545 people | 90 minutes | Difficult | FREE | |
Number Theory 2
You will study Fermat's little theorem, Euler's theorem, and practice with soem integer classes in SageMath.
| 379 people | 60 minutes | Easy | FREE | |
Web Hacking 101
Learn Web Hacking 101.
| 3,319 people | 30 minutes | Very easy | FREE | |
Exercise: Blind SQL Injection
Improve your understanding of blind SQL injection by solving a wargame challenge.
| 4,453 people | 120 minutes | Easy | FREE | |
Background: Web
In this lecture, you'll learn about the web and its components.
| 18,331 people | 60 minutes | Easy | FREE | |
Background: Cookie & Session
Explain cookies and sessions.
| 11,362 people | 60 minutes | Very easy | FREE | |
Block ciphers and modes of operation
Learn the different modes of operation for block ciphers, including ECB, CBC, and CTR.
| 175 people | 30 minutes | Very easy | FREE | |
Background: HTTP/HTTPS
Learn about HTTP and HTTPS, the protocols used for web communication.
| 18,377 people | 60 minutes | Easy | FREE | |
Sender
Learn the characteristics of keywords related to sender used in Solidity contracts and the vulnerabilities associated with them.
| 30 minutes | Easy | ENTERPRISE | ||
Background: Web Browser
Learn about the concepts and roles of web browsers.
| 13,043 people | 60 minutes | Easy | FREE | |
[WHA-C] Exercise: CSP Bypass
Let's solve CSP Bypass together.
| 954 people | 90 minutes | Easy | FREE | |
Exercise: Command Injection
Executes the desired command via command injection.
| 1,944 people | 30 minutes | Very easy | FREE | |
Background: Relational DBMS
In this lecture, you'll learn about relational database management systems and SQL.
| 5,307 people | 60 minutes | Easy | FREE | |
ServerSide: Command Injection
Learn command injection, a server-side attack.
| 4,208 people | 60 minutes | Very easy | FREE | |
ClientSide: XSS
Learn XSS, a common client-side attack.
| 8,396 people | 90 minutes | Easy | FREE | |
ServerSide: SSRF
Learn about SSRF, a server-side attack.
| 3,387 people | 60 minutes | Very easy | FREE | |
ClientSide: CSRF
Learn CSRF, a client-side attack.
| 6,424 people | 60 minutes | Easy | FREE | |
Background: Linux Memory Layout
Describes the memory structure of a Linux process.
| 9,166 people | 30 minutes | Very easy | FREE | |
ServerSide: SQL Injection
Learn about SQL Injection, a server-side attack.
| 5,394 people | 90 minutes | Easy | FREE | |
Tool: Environment Setup⚙️
Describe how to use virtualization software to create the environment needed for roadmap
| 4,315 people | 15 minutes | Very easy | FREE | |
Memory Corruption: Stack Buffer Overflow
We will examine the concept of stack buffer overflow and learn about the security threats that can arise from it.
| 3,744 people | 60 minutes | Easy | FREE | |
Mitigation: Stack Canary
Learn about Stack Canary, which protects the return address from stack buffer overflow.
| 3,051 people | 30 minutes | Very easy | FREE | |
Classical Ciphers
Learn the types of classic ciphers and how to attack them simply.
| 1,103 people | 30 minutes | Very easy | FREE | |
Coding
Learn the basics of coding.
| 3,750 people | 120 minutes | Easy | FREE | |
Background: Computer Architecture
Describes computer architecture, instruction set architecture, and x86-64 architecture.
| 10,033 people | 30 minutes | Very easy | FREE | |
Exploit Tech: Return Address Overwrite
Learn the principles and methods of return address overwrite attacks through a simple example.
| 3,728 people | 120 minutes | Easy | FREE | |
Exploit Tech: Return to Shellcode
Learn attack techniques for bypassing canary and hijacking execution flow to shellcode.
| 2,788 people | 90 minutes | Easy | FREE | |
Memory Corruption: Double Free Bug
We will learn the causes and effects of the Double Free Bug and protection techniques to prevent it.
| 1,367 people | 30 minutes | Very easy | FREE | |
x86 Assembly🤖: Essential Part(1)
Learn the fundamental assembly language for system hacking.
| 7,680 people | 60 minutes | Very easy | FREE | |
Exploit Tech: Return to Library
Learn the principles and methods of attack techniques used for bypassing canaries and exploiting code in libraries.
| 2,446 people | 90 minutes | Easy | FREE | |
Exploit Tech: Shellcode
Learn what shellcode is, how to write it, and how to debug it.
| 5,565 people | 90 minutes | Easy | FREE | |
Background: Computer Architecture
Describes computer structure and instruction set structure, and the x86-64 architecture.
| 6,445 people | 60 minutes | Easy | FREE | |
Background: Library - Static Link vs. Dynamic Link
Learn the concepts of libraries and links, PLT and GOT in Linux.
| 2,358 people | 60 minutes | Easy | FREE | |
Background: ptmalloc2
Describes the main objects and memory management mechanisms of ptmalloc2.
| 763 people | 90 minutes | Easy | FREE | |
x86 Assembly🤖: Essential Part(1)
Learn the necessary assembly language to learn reverse engineering.
| 5,257 people | 60 minutes | Very easy | FREE | |
Introduction
Learn about the goals and objectives of the cryptography roadmap and the topics it covers.
| 1,658 people | 15 minutes | Very easy | FREE | |
Hash Functions
Learn the role and types of hash algorithms and the Message Authentication Code (MAC) using them.
| 177 people | 60 minutes | Very easy | FREE | |
Exploit Tech: Hook Overwrite
Describe hook overwrite attack techniques and practice with examples.
| 1,889 people | 60 minutes | Very easy | FREE | |
Logical Bug: Type Error
Learn the bugs that can occur due to incorrect usage of data types.
| 1,119 people | 60 minutes | Easy | FREE | |
Background: Binary
Describes what a binary is and the compilation process.
| 9,260 people | 30 minutes | Very easy | FREE | |
Memory Corruption: Out of Bounds
Learn about the types of code with OOB vulnerability, and how OOB can be leveraged in attacks.
| 1,719 people | 30 minutes | Very easy | FREE | |
Logical Bug: Command Injection
Let's learn about command injection vulnerabilities, which occurs by misusing functions that execute system commands.
| 1,188 people | 30 minutes | Very easy | FREE | |
Background: Static Analysis vs. Dynamic Analysis
Describe the two branches of software analysis techniques, static and dynamic analysis, and the differences between the two.
| 3,068 people | 15 minutes | Very easy | FREE | |
Reentrancy
Learn about re-entry attacks in smart contracts.
| 30 minutes | Easy | ENTERPRISE | ||
Logical Bug: Path Traversal
Learn about path traversal vulnerabilities and how to leverage it in attacks.
| 1,165 people | 30 minutes | Very easy | FREE |
[WHA-S] Background: SQL DML
2533
people completed this lecture.
Exploit Tech: Meet-in-the-middle Attack
915
people completed this lecture.
FAT32 and NTFS File Systems
314
people completed this lecture.
Exploit Tech: Length Eextension Attack
133
people completed this lecture.
Exploit Tech: Format String Bug
1645
people completed this lecture.
Exploit Tech: _IO_FILE Arbitrary Address Write
545
people completed this lecture.
Number Theory 2
379
people completed this lecture.
Web Hacking 101
3319
people completed this lecture.
Exercise: Blind SQL Injection
4453
people completed this lecture.
Background: Web
18331
people completed this lecture.
Background: Cookie & Session
11362
people completed this lecture.
Block ciphers and modes of operation
175
people completed this lecture.
Background: HTTP/HTTPS
18377
people completed this lecture.
Background: Web Browser
13043
people completed this lecture.
[WHA-C] Exercise: CSP Bypass
954
people completed this lecture.
Exercise: Command Injection
1944
people completed this lecture.
Background: Relational DBMS
5307
people completed this lecture.
ServerSide: Command Injection
4208
people completed this lecture.
ClientSide: XSS
8396
people completed this lecture.
ServerSide: SSRF
3387
people completed this lecture.
ClientSide: CSRF
6424
people completed this lecture.
Background: Linux Memory Layout
9166
people completed this lecture.
ServerSide: SQL Injection
5394
people completed this lecture.
Tool: Environment Setup⚙️
4315
people completed this lecture.
Memory Corruption: Stack Buffer Overflow
3744
people completed this lecture.
Mitigation: Stack Canary
3051
people completed this lecture.
Classical Ciphers
1103
people completed this lecture.
Coding
3750
people completed this lecture.
Background: Computer Architecture
10033
people completed this lecture.
Exploit Tech: Return Address Overwrite
3728
people completed this lecture.
Exploit Tech: Return to Shellcode
2788
people completed this lecture.
Memory Corruption: Double Free Bug
1367
people completed this lecture.
x86 Assembly🤖: Essential Part(1)
7680
people completed this lecture.
Exploit Tech: Return to Library
2446
people completed this lecture.
Exploit Tech: Shellcode
5565
people completed this lecture.
Background: Computer Architecture
6445
people completed this lecture.
Background: Library - Static Link vs. Dynamic Link
2358
people completed this lecture.
Background: ptmalloc2
763
people completed this lecture.
x86 Assembly🤖: Essential Part(1)
5257
people completed this lecture.
Introduction
1658
people completed this lecture.
Hash Functions
177
people completed this lecture.
Exploit Tech: Hook Overwrite
1889
people completed this lecture.
Logical Bug: Type Error
1119
people completed this lecture.
Background: Binary
9260
people completed this lecture.
Memory Corruption: Out of Bounds
1719
people completed this lecture.
Logical Bug: Command Injection
1188
people completed this lecture.
Background: Static Analysis vs. Dynamic Analysis
3068
people completed this lecture.
Logical Bug: Path Traversal
1165
people completed this lecture.