Stay informed with all the latest updates, features, and announcements all in one place!
📌 Bookmark the link below and never miss out on the latest from Hack The Box!
Three (3) new exclusive Machines landed in Dedicated Labs, focusing on CVE exploitation, Privilege Escalation, NTLM Relaying & SQL Server Abuse, and more!
Cup
Learn how to exploit multiple vulnerabilities in the CUPS printing system, from initial foothold via a crafted request to privilege escalation through remote printer creation. You’ll leverage these flaws for lateral movement, obtaining full system privileges by exploiting various CVEs and insecure configurations.
Slashed
Explore how an Apache Web Server vulnerability (CVE-2024-38472) leaks NTLMv2 hashes, which can then be relayed to escalate privileges via Microsoft SQL Server, showcasing the dangers of credential exposure and improper authentication mechanisms.
Peeps
Learn how to exploit an Apache ACL bypass vulnerability to gain SSH access with leaked credentials, and then see how Docker group access can be abused for privilege escalation, emphasizing the importance of securing access controls and container permissions.
Step into the shoes of a DFIR expert and solve the newest mystery in Dedicated Labs!
In this scenario, Happy Grunwald reports trying to download Microsoft Office from a suspicious email. After solving a CAPTCHA, no download page appeared.
Sysadmin Alonzo, recalling past phishing attacks, suspects an intrusion. Now, it’s your turn to investigate!
Complete the new Sherlock and learn how to:
Sharpen your team’s defensive skills with 10 advanced Challenges in the new CTF pack, covering topics like memory analysis, malware investigation, Active Directory attacks, and network forensics.
Building on the Defensive Security - Essentials CTF Pack, the new pack covers 67% of the recommended Modules in Academy’s SOC Analyst job-role path, making it ideal for those pursuing HTB CDSA or professionals aiming to enhance their defensive security expertise.
Host your next CTF event and allow your team to:
Build a strong foundation in securing Wi-Fi networks with the Wifi-Penetration Testing Basics Module on Academy for Business.
By completing this Module, you’ll gain fundamental knowledge in:
Sharpen your team's skills in web vulnerabilities with the Bug Bounty Hunting - Enhanced CTF pack.
This pack offers 10 advanced Challenges that mirror critical flaws found in modern web applications, like RCE, LFI, XXE, SSTI, SQL injection, and XSS.
When combined with the Bug Bounty Hunting - Essentials CTF Pack, it covers 90% of the Academy’s Bug Bounty Hunter job-role path—ideal for those preparing for the HTB CBBH certification or penetration testers looking to improve their web security expertise.
Organize a CTF event and enable your team to:
The "Intro to Mobile Security" path combines easy-to-medium Machines and Challenges designed to walk your team through APK cracking, reverse engineering, mastering Frida for dynamic instrumentation, and more!
The new path helps develop hands-on skills essential for today’s mobile security landscape, including:
Following the disclosure of new vulnerabilities in the OpenPrinting Common Unix Printing System (CUPS) on September 26, 2024, we took immediate action by releasing EvilCUPS in Dedicated Labs.
Now, you can start exploiting and mitigating these security flaws on Linux systems firsthand.
EvilCUPS simulates multiple CVEs, including CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, which open doors to unauthorized attackers, exploiting print jobs to execute malicious code on a target system.
Stay ahead of emerging threats and gain valuable experience in:
Tackle insider threats, APT28 breaches, and system misconfigurations with three (3) exclusive DFIR Sherlocks.
Saboteur
Learn how to investigate insider threats by analyzing suspicious user activity, file deletions, and using correlation rules to uncover cyberattacks not flagged by monitoring systems.
Fancy Pants
Develop forensic analysis skills to identify APT28 attack techniques using multiple data sources. Focus on vulnerabilities such as those in Ivanti Virtual Traffic Manager that can lead to breaches.
Highway Patrol
Enhance your log analysis capabilities to detect unusual system behavior, such as unauthorized server setups, and understand how to respond effectively to security incidents without monitoring capabilities.
Benchmark your team’s skills before, during, or after CWEE certification with the new Advanced Web Exploitation CTF pack.
This pack features 10 Challenges covering everything from PHP-type juggling flaws to NoSQL injections. It fosters both individual development and team collaboration, offering a hands-on approach to mastering advanced web vulnerabilities.
Plus, with content mapped to Modules in the HTB Academy, it aligns perfectly with 43% of the Senior Web Penetration Tester job-role path.
Organize your next CTF and allow your team to: