https://academy.hackthebox.com/course/preview/mssql-exchange-and-sccm-attacks
MSSQL, Exchange, and SCCM Attacks Course | HTB Academy
This module covers attacks targeting tightly incorporated technologies in Active Directory environments such as MSSQL, Exchange, and SCCM, and how to identif...
attacks course htbmssqlsccm
https://academy.hackthebox.com/course/preview/server-side-attacks
Server-side Attacks Course | HTB Academy
A backend that handles user-supplied input insecurely can lead to devastating security vulnerabilities such as sensitive information disclosure and remote co...
attacks course htbserver side
https://academy.hackthebox.com/course/preview/web-service--api-attacks
Web Service & API Attacks Course | HTB Academy
Web services and APIs are frequently exposed to provide certain functionalities in a programmatic way between heterogeneous devices and software components....
api attacks courseweb service
https://academy.hackthebox.com/course/preview/injection-attacks
Injection Attacks Course | HTB Academy
This module covers three injection attacks: XPath injection, LDAP injection, and HTML injection in PDF generation libraries. While XPath and LDAP injection v...
injection attacks coursehtb
https://academy.hackthebox.com/course/preview/password-attacks
Password Attacks Course | HTB Academy
Passwords are still the primary method of authentication in corporate networks. If strong password policies are not enforced, users often choose weak, easy-t...
attacks course htbpassword
https://academy.hackthebox.com/course/preview/ntlm-relay-attacks
NTLM Relay Attacks Course | HTB Academy
attacks course htbntlm relay
https://academy.hackthebox.com/course/preview/ai-data-attacks
AI Data Attacks Course | HTB Academy
This module explores the intersection of Data and Artificial Intelligence, exposing how vulnerabilities within AI data pipelines can be exploited, ultimately...
attacks course htbai data
https://academy.hackthebox.com/course/preview/supply-chain-attacks
Supply Chain Attacks Course | HTB Academy
This module provides a detailed overview of Supply Chain Attacks, covering hardware and software aspects. It explores the impact of supply chains, the lifecy...
supply chain attackscoursehtb
https://academy.hackthebox.com/course/preview/advanced-deserialization-attacks
Advanced Deserialization Attacks Course | HTB Academy
This module focuses on developing custom exploits for .NET deserialization vulnerabilities from a whitebox perspective.
attacks course htbadvanced
Sponsored https://www.bootycallz.com/
Booty Callz - World's Sexiest Black Hookup Dating @ BootyCallz.com
https://academy.hackthebox.com/course/preview/detecting-access-token-manipulation-attacks
Detecting Access Token Manipulation Attacks Course | HTB Academy
This module focuses on Windows privilege escalation techniques through access token manipulation. It covers various topics, including Windows processes, acce...
access token manipulationhtb
https://academy.hackthebox.com/course/preview/whitebox-attacks
Whitebox Attacks Course | HTB Academy
attacks course htbwhitebox
https://academy.hackthebox.com/course/preview/http-attacks
HTTP Attacks Course | HTB Academy
This module covers three HTTP vulnerabilities: CRLF Injection, HTTP Request Smuggling, and HTTP/2 Downgrading. These vulnerabilities can arise on the HTTP le...
attacks course htbhttpacademy
https://academy.hackthebox.com/course/preview/wired-equivalent-privacy-wep-attacks
Wired Equivalent Privacy (WEP) Attacks Course | HTB Academy
attacks course htbwiredwep
https://academy.hackthebox.com/course/preview/httpstls-attacks
HTTPs/TLS Attacks Course | HTB Academy
This module covers details on Transport Layer Security (TLS) and how it helps to make HTTP secure with the widely used HTTPS. That includes how TLS works, ho...
attacks course htbhttpstls
https://academy.hackthebox.com/course/preview/llm-output-attacks
LLM Output Attacks Course | HTB Academy
In this module, we will explore different LLM output vulnerabilities resulting from improper handling of LLM outputs and insecure LLM applications. We will a...
attacks course htbllm output
https://academy.hackthebox.com/course/preview/process-injection-attacks-and-detection
Process Injection Attacks and Detection Course | HTB Academy
This module focuses on understanding the process injection techniques attackers use to execute malicious code within the context of legitimate processes. Thi...
course htb academyprocess
https://academy.hackthebox.com/course/preview/ai-evasion---sparsity-attacks
AI Evasion - Sparsity Attacks Course | HTB Academy
This module explores sparsity-constrained adversarial attacks that minimize the number of modified input features rather than perturbation magnitude, showing...
attacks course htbaievasion
Sponsored https://www.fanvue.com/
Fanvue
The creator subscription platform for the future. Sign up before the end of the month and take home 85%.
https://academy.hackthebox.com/course/preview/detecting-windows-attacks-with-splunk
Detecting Windows Attacks with Splunk Course | HTB Academy
This Hack The Box Academy module is focused on pinpointing attacks on Windows and Active Directory. Utilizing Splunk as the cornerstone for investigation, th...
splunk course htbdetecting
https://academy.hackthebox.com/course/preview/dacl-attacks-i
DACL Attacks I Course | HTB Academy
Discretionary Access Control Lists (DACLs), found within security descriptors, are a fundamental component of the security model of Windows and Active Direct...
course htb academydaclattacks
https://academy.hackthebox.com/course/preview/dacl-attacks-ii
DACL Attacks II Course | HTB Academy
In this second module on Discretionary Access Control Lists (DACLs), we delve into sophisticated attack techniques and strategies within Windows Active Direc...
course htb academydaclattacks
https://academy.hackthebox.com/course/preview/introduction-to-deserialization-attacks
Introduction to Deserialization Attacks Course | HTB Academy
In this module, we will explore deserialization attacks with specific examples in Python and PHP.
attacks course htbacademy
https://academy.hackthebox.com/course/preview/active-directory-enumeration--attacks
Active Directory Enumeration & Attacks Course | HTB Academy
Active Directory (AD) is the leading enterprise domain management suite, providing identity and access management, centralized domain administration, authent...
attacks course htbactiveamp
https://academy.hackthebox.com/course/preview/brief-intro-to-hardware-attacks
Brief Intro to Hardware Attacks Course | HTB Academy
This mini-module concisely introduces hardware attacks, covering Bluetooth risks and attacks, Cryptanalysis Side-Channel Attacks, and vulnerabilities like Sp...
attacks course htbbrief intro
https://academy.hackthebox.com/course/preview/api-attacks
API Attacks Course | HTB Academy
Web APIs serve as crucial connectors across diverse entities in the modern digital landscape. However, their extensive functionality also exposes them to a r...
api attacks coursehtb academy
https://academy.hackthebox.com/course/preview/active-directory-trust-attacks
Active Directory Trust Attacks Course | HTB Academy
Active Directory (AD) is the leading solution for organizations to provide identity and access management, centralized domain administration, authentication,...
attacks course htbactivetrust
https://academy.hackthebox.com/course/preview/adcs-attacks
ADCS Attacks Course | HTB Academy
This module focuses on privilege escalation attacks by abusing misconfigurations in Active Directory Certificate Services.
attacks course htbadcsacademy
https://academy.hackthebox.com/course/preview/ai-evasion---first-order-attacks
AI Evasion - First-Order Attacks Course | HTB Academy
This module explores gradient-based adversarial attacks that manipulate neural network inputs at inference time, showing how to craft perturbations that caus...
attacks course htbfirst order
https://academy.hackthebox.com/course/preview/web-attacks
Web Attacks Course | HTB Academy
attacks course htbwebacademy
https://academy.hackthebox.com/course/preview/windows-attacks--defense
Windows Attacks & Defense Course | HTB Academy
Microsoft Active Directory (AD) has been, for the past 20+ years, the leading enterprise domain management suite, providing identity and access management, c...
defense course htbwindowsamp
https://academy.hackthebox.com/course/preview/prompt-injection-attacks
Prompt Injection Attacks Course | HTB Academy
This module comprehensively introduces one of the most prominent attacks on large language models (LLMs): Prompt Injection. It introduces prompt injection ba...
prompt injection attackshtb
https://academy.hackthebox.com/course/preview/wi-fi-evil-twin-attacks
Wi-Fi Evil Twin Attacks Course | HTB Academy
This module explores the concept of evil twin attacks on Wi-Fi networks, focusing on WPA2, WPA3, and WPA-Enterprise. Despite these protocols being designed w...
attacks course htbwi fievil
https://academy.hackthebox.com/course/preview/kerberos-attacks
Kerberos Attacks Course | HTB Academy
Kerberos is an authentication protocol that allows users to authenticate and access services on a potentially insecure network. Due to its prevalence through...
attacks course htbkerberos
https://academy.hackthebox.com/course/preview/file-upload-attacks
File Upload Attacks Course | HTB Academy
Arbitrary file uploads are among the most critical web vulnerabilities. These flaws enable attackers to upload malicious files, execute arbitrary commands on...
attacks course htbfile upload