Recommended roadmaps
People to follow
Recommended courses
Roadmaps
Looking for cybersecurity courses for your organization? Train your team with Dreamhack.
All courses
Course title | Finished users | Taken time | Difficulty (Click to sort ascending) | Price | |
---|---|---|---|---|---|
Exploit Tech: Storage
Solidity 코드를 읽고 컨트랙트의 스토리지로부터 값을 읽어와 문제를 풀어봅니다.
| 60 minutes | Easy | ENTERPRISE | ||
Background: Web
In this lecture, you'll learn about the web and its components.
| 15,427 | 60 minutes | Easy | FREE | |
펌웨어 분석
펌웨어 분석을 학습합니다.
| 80 | 60 minutes | Normal | PAID | |
Background: Cloud
클라우드 기술과 클라우드의 보안에 대해 간단히 설명합니다.
| 30 minutes | Very easy | ENTERPRISE | ||
암호 관련
암호 관련 취약점과 패치 방법을 학습합니다.
| 30 minutes | Difficult | ENTERPRISE | ||
V8 Exploit Technique
V8 Exploit의 원리 및 방법을 학습합니다.
| 63 | 90 minutes | Very Difficult | PAID | |
ServerSide: File Vulnerability
Learn server-side attacks: file uploads and downloads.
| 3,176 | 90 minutes | Easy | FREE | |
문자열
문자열 입력값 검증 문제 확인 및 수정 방안을 학습합니다.
| 90 minutes | Difficult | ENTERPRISE | ||
안전한 라이브러리 사용법
라이브러리를 안전하기 사용하기 위한 주의사항을 학습합니다.
| 120 minutes | Difficult | ENTERPRISE | ||
Introduction
Learn about the goals and objectives of the cryptography roadmap and the topics it covers.
| 832 | 15 minutes | Very easy | FREE | |
Digital Signatures
Introduce the concept of digital signatures and learn the mathematical principles of different digital signatures.
| 65 | 60 minutes | Easy | FREE | |
블록체인과 스마트 컨트랙트
블록체인과 스마트 컨트랙트가 어떤 개념인지 이해합니다.
| 30 minutes | Easy | ENTERPRISE | ||
AWS: Data Security (v1 legacy)
데이터 보안과 관련된 AWS 서비스를 소개하고, 이들을 안전하게 설정하는 방법을 학습합니다.
| 60 minutes | Very easy | ENTERPRISE | ||
Exercise: Cookie & Session
Learn how to gain administrator privileges with session information.
| 2,035 | 30 minutes | Very easy | FREE | |
Exercise: File Vulnerability-2
Access the desired file via a path traversal vulnerability.
| 688 | 30 minutes | Very easy | FREE | |
Exploit Tech: ROP x64
Acquire a shell through return-oriented programming (ROP) techniques in the x64 environment.
| 497 | 30 minutes | Very easy | FREE | |
AWS: Network (v1 legacy)
네트워크와 관련된 AWS 서비스를 소개하고, 이들을 안전하게 설정하는 방법을 학습합니다.
| 60 minutes | Very easy | ENTERPRISE | ||
Lecture Introduction👨💻
Take a look the goals and organization of the Digital Forensics roadmap.
| 3 minutes | Very easy | ENTERPRISE | ||
Exercise: CSRF-2
Learn how to use CSRF attack techniques to gain administrator privileges.
| 1,165 | 30 minutes | Very easy | FREE | |
Exploit Tech: Associated Nonces
Learn why the nonce k used in DSA is vulnerable when it is not a random value.
| 41 | 60 minutes | Easy | FREE | |
System Log Analysis
Analyzing Linux system logs
| 90 minutes | Easy | ENTERPRISE | ||
Exploit Tech: Out of bounds
x86 환경에서 Out of bounds 취약점을 이용해 임의의 명령어를 실행하여 공격에 성공합니다.
| 320 | 30 minutes | Very easy | FREE | |
$LogFile, $UsnJrnl
$LogFile, $UsnJrnl
| 40 minutes | Easy | ENTERPRISE | ||
Exploit Tech: Meet-in-the-middle Attack
Learn how the meet-in-the-middle attack works.
| 433 | 60 minutes | Very easy | FREE | |
Classical Ciphers
Learn the types of classic ciphers and how to attack them simply.
| 537 | 30 minutes | Very easy | FREE | |
Number Theory 2
You will study Fermat's little theorem, Euler's theorem, and practice with soem integer classes in SageMath.
| 180 | 60 minutes | Easy | FREE | |
Exploit Tech: Signature without Hashing
Learn why DSA signatures require a secure hash function.
| 52 | 60 minutes | Easy | FREE | |
Heap Allocator Exploit
ptmalloc2 allocator의 원리 및 공격하는 방법을 학습합니다.
| 922 | 150 minutes | Difficult | FREE | |
access-log
access-log
| 60 minutes | Difficult | ENTERPRISE | ||
Exploit Tech: Shellcode
Learn what shellcode is, how to write it, and how to debug it.
| 4,752 | 90 minutes | Easy | FREE | |
Exercise: rev-basic-3
rev-basic-3을 함께 풀어봅니다.
| 571 | 30 minutes | Very easy | FREE | |
Heap Allocator Exploit - 2
GLIBC 2.29 버전에 추가된 보호 기법을 이해하고 공격하는 방법을 학습합니다.
| 699 | 60 minutes | Normal | FREE | |
전자/전기
전자/전기에 대해서 설명합니다.
| 30 minutes | Easy | ENTERPRISE | ||
PCB
PCB에 대해서 설명합니다.
| 120 minutes | Easy | ENTERPRISE | ||
V8 Debug
V8엔진 Debug를 학습합니다.
| 89 | 30 minutes | Very Difficult | PAID | |
strange-program
strange-program
| 60 minutes | Very Difficult | ENTERPRISE | ||
AWS: Monitoring&Inspection (v1 legacy)
AWS의 모니터링 서비스와 보안 감사 서비스에 대해 설명합니다.
| 60 minutes | Very easy | ENTERPRISE | ||
Exploit Tech: Tcache Poisoning
Tcache Poisoning의 원리와 효과에 대해 알아보고 공격 기법을 실습합니다.
| 1,052 | 60 minutes | Easy | FREE | |
Exploit Tech: Return Address Overwrite
Learn the principles and methods of return address overwrite attacks through a simple example.
| 3,153 | 120 minutes | Easy | FREE | |
[WHA-S] Exercise: File Vulnerability Advanced
Let's unpack File Vulnerability Advanced for linux together.
| 593 | 60 minutes | Easy | FREE | |
장비 사용법
장비 사용법을 학습합니다.
| 120 minutes | Easy | ENTERPRISE | ||
Virtual Machine
Learn the virtual machine.
| 4,804 | 120 minutes | Very easy | FREE | |
Web Hacking 101
Learn Web Hacking 101.
| 2,232 | 30 minutes | Very easy | FREE | |
디버그 인터페이스 사용
디버그 인터페이스를 사용한 펌웨어 추출 방법을 학습합니다.
| 120 minutes | Normal | ENTERPRISE | ||
Event log
Event log
| 60 minutes | Easy | ENTERPRISE | ||
플래시 메모리 데이터 추출
플래시 메모리 데이터 추출 방법에 대해서 학습합니다.
| 60 minutes | Normal | ENTERPRISE | ||
Introducing Embedded!
임베디드 해킹 로드맵의 목표와 구성을 알아봅니다.
| 440 | 15 minutes | Very easy | FREE | |
eMMC 데이터 추출
eMMC 데이터 추출 방법을 학습합니다.
| 60 minutes | Normal | ENTERPRISE | ||
Exploit Tech: Return Oriented Programming
Learn the principles and methods of Return Oriented Programming.
| 1,935 | 90 minutes | Easy | FREE | |
Introducing Hardware!
하드웨어 해킹 로드맵의 목표와 구성을 알아봅니다.
| 15 minutes | Very easy | ENTERPRISE |
Background: Web
15427
finished this course.
펌웨어 분석
80
finished this course.
V8 Exploit Technique
63
finished this course.
ServerSide: File Vulnerability
3176
finished this course.
Introduction
832
finished this course.
Digital Signatures
65
finished this course.
Exercise: Cookie & Session
2035
finished this course.
Exercise: File Vulnerability-2
688
finished this course.
Exploit Tech: ROP x64
497
finished this course.
Exercise: CSRF-2
1165
finished this course.
Exploit Tech: Associated Nonces
41
finished this course.
Exploit Tech: Out of bounds
320
finished this course.
Exploit Tech: Meet-in-the-middle Attack
433
finished this course.
Classical Ciphers
537
finished this course.
Number Theory 2
180
finished this course.
Exploit Tech: Signature without Hashing
52
finished this course.
Heap Allocator Exploit
922
finished this course.
Exploit Tech: Shellcode
4752
finished this course.
Exercise: rev-basic-3
571
finished this course.
Heap Allocator Exploit - 2
699
finished this course.
V8 Debug
89
finished this course.
Exploit Tech: Tcache Poisoning
1052
finished this course.
Exploit Tech: Return Address Overwrite
3153
finished this course.
[WHA-S] Exercise: File Vulnerability Advanced
593
finished this course.
Virtual Machine
4804
finished this course.
Web Hacking 101
2232
finished this course.
Introducing Embedded!
440
finished this course.
Exploit Tech: Return Oriented Programming
1935
finished this course.