All latest news and releases on Hack The Box platforms.
Improvement
New

Explore all release notes from Hack The Box on the new changelog feed.

jack avatar
Shared by jack • December 07, 2024

Stay informed with all the latest updates, features, and announcements all in one place!

  • Filter with ease: Narrow down updates by HTB platform (Labs, Academy, Enterprise, CTF) or content type (offensive, defensive) to find what matters most to you.
  • Engage and share: Like posts, share them with your team or network, and spread the word effortlessly.
  • Stay connected: Subscribe to email or RSS notifications to receive instant updates as they happen.
  • Find quickly: Use the search bar to locate exactly what you need in seconds.

📌 Bookmark the link below and never miss out on the latest from Hack The Box!

New release
Product update
Exclusive

New exclusive Machines are available in Dedicated Labs.

jack avatar
Shared by jack • October 22, 2024

Three (3) new exclusive Machines landed in Dedicated Labs, focusing on CVE exploitation, Privilege Escalation, NTLM Relaying & SQL Server Abuse, and more!

Cup

Learn how to exploit multiple vulnerabilities in the CUPS printing system, from initial foothold via a crafted request to privilege escalation through remote printer creation. You’ll leverage these flaws for lateral movement, obtaining full system privileges by exploiting various CVEs and insecure configurations.

Slashed

Explore how an Apache Web Server vulnerability (CVE-2024-38472) leaks NTLMv2 hashes, which can then be relayed to escalate privileges via Microsoft SQL Server, showcasing the dangers of credential exposure and improper authentication mechanisms.

Peeps

Learn how to exploit an Apache ACL bypass vulnerability to gain SSH access with leaked credentials, and then see how Docker group access can be abused for privilege escalation, emphasizing the importance of securing access controls and container permissions.

New release
Product update

Dive into phishing forensics with a new DFIR Sherlock.

jack avatar
Shared by jack • October 22, 2024

Step into the shoes of a DFIR expert and solve the newest mystery in Dedicated Labs!

In this scenario, Happy Grunwald reports trying to download Microsoft Office from a suspicious email. After solving a CAPTCHA, no download page appeared.

Sysadmin Alonzo, recalling past phishing attacks, suspects an intrusion. Now, it’s your turn to investigate!

Complete the new Sherlock and learn how to:

  • Analyze network traffic and endpoint artifacts
  • Detect phishing tactics and trace attacker activity
  • Apply real-world DFIR skills to contain and mitigate threats
Product update
New

Enhance your team’s Defensive Security techniques with the new CTF pack.

jack avatar
Shared by jack • October 15, 2024

Sharpen your team’s defensive skills with 10 advanced Challenges in the new CTF pack, covering topics like memory analysis, malware investigation, Active Directory attacks, and network forensics.

Building on the Defensive Security - Essentials CTF Pack, the new pack covers 67% of the recommended Modules in Academy’s SOC Analyst job-role path, making it ideal for those pursuing HTB CDSA or professionals aiming to enhance their defensive security expertise.

Host your next CTF event and allow your team to:

  • Analyze disk images, including file carving and persistence detection
  • Deobfuscate scripts and investigate multi-stage phishing attacks
  • Analyze memory dumps to detect malware and malicious connections
  • Understand malware operations through API call analysis
New release
Product update

Learn about Wi-Fi security with a new Academy Module.

jack avatar
Shared by jack • October 15, 2024

Build a strong foundation in securing Wi-Fi networks with the Wifi-Penetration Testing Basics Module on Academy for Business.

By completing this Module, you’ll gain fundamental knowledge in:

  • Enumerating and mapping access points
  • Exploiting vulnerabilities in Wi-Fi networks
  • Discovering hidden networks
  • Bypassing MAC filtering using aircrack-ng tools
New release
Product update

Enhance your team’s Bug Bounty Hunting skills with the new CTF pack.

jack avatar
Shared by jack • October 08, 2024

Sharpen your team's skills in web vulnerabilities with the Bug Bounty Hunting - Enhanced CTF pack.

This pack offers 10 advanced Challenges that mirror critical flaws found in modern web applications, like RCE, LFI, XXE, SSTI, SQL injection, and XSS.

When combined with the Bug Bounty Hunting - Essentials CTF Pack, it covers 90% of the Academy’s Bug Bounty Hunter job-role path—ideal for those preparing for the HTB CBBH certification or penetration testers looking to improve their web security expertise.

Organize a CTF event and enable your team to:

  • Bypass security mechanisms.
  • Exploit vulnerabilities in CMS platforms.
  • Master advanced techniques like SQL injection, command injection, and XSS.
  • Gain real-world experience in web security.
New release
Product update

New Mobile Security path in Dedicated Labs.

jack avatar
Shared by jack • October 08, 2024

The "Intro to Mobile Security" path combines easy-to-medium Machines and Challenges designed to walk your team through APK cracking, reverse engineering, mastering Frida for dynamic instrumentation, and more!

The new path helps develop hands-on skills essential for today’s mobile security landscape, including:

  • Android OS architecture.
  • APK analysis and reverse engineering.
  • SSL pinning bypass and debugging.
  • Frida-based instrumentation.
  • Traffic interception and JavaScript analysis.
  • AES data decryption.
New release
Product update

Exploit CUPS vulnerabilities with a new CVE Machine.

jack avatar
Shared by jack • October 02, 2024

Following the disclosure of new vulnerabilities in the OpenPrinting Common Unix Printing System (CUPS) on September 26, 2024, we took immediate action by releasing EvilCUPS in Dedicated Labs.

Now, you can start exploiting and mitigating these security flaws on Linux systems firsthand.

EvilCUPS simulates multiple CVEs, including CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, which open doors to unauthorized attackers, exploiting print jobs to execute malicious code on a target system.

Stay ahead of emerging threats and gain valuable experience in:

  • Identifying and exploiting remote code execution flaws in CUPS.
  • Chaining vulnerabilities for maximum impact.
  • Implementing mitigation strategies and secure configurations.
Exclusive
Product update
New release

New exclusive Sherlocks are now available in Dedicated Labs.

jack avatar
Shared by jack • October 01, 2024

Tackle insider threats, APT28 breaches, and system misconfigurations with three (3) exclusive DFIR Sherlocks.

Saboteur

Learn how to investigate insider threats by analyzing suspicious user activity, file deletions, and using correlation rules to uncover cyberattacks not flagged by monitoring systems.

Fancy Pants

Develop forensic analysis skills to identify APT28 attack techniques using multiple data sources. Focus on vulnerabilities such as those in Ivanti Virtual Traffic Manager that can lead to breaches.

Highway Patrol

Enhance your log analysis capabilities to detect unusual system behavior, such as unauthorized server setups, and understand how to respond effectively to security incidents without monitoring capabilities.

Product update
New

Prepare your team for Senior Web Application Security roles with the new CTF pack.

jack avatar
Shared by jack • October 01, 2024

Benchmark your team’s skills before, during, or after CWEE certification with the new Advanced Web Exploitation CTF pack.

This pack features 10 Challenges covering everything from PHP-type juggling flaws to NoSQL injections. It fosters both individual development and team collaboration, offering a hands-on approach to mastering advanced web vulnerabilities.

Plus, with content mapped to Modules in the HTB Academy, it aligns perfectly with 43% of the Senior Web Penetration Tester job-role path.

Organize your next CTF and allow your team to:

  • Identify and exploit advanced web vulnerabilities.
  • Develop skills in real-world web application exploitation techniques.
  • Improve understanding of securing web applications.