Robuta

https://academy.hackthebox.com/course/preview/mssql-exchange-and-sccm-attacks MSSQL, Exchange, and SCCM Attacks Course | HTB Academy This module covers attacks targeting tightly incorporated technologies in Active Directory environments such as MSSQL, Exchange, and SCCM, and how to identif... attacks course htbmssqlsccm https://academy.hackthebox.com/course/preview/server-side-attacks Server-side Attacks Course | HTB Academy A backend that handles user-supplied input insecurely can lead to devastating security vulnerabilities such as sensitive information disclosure and remote co... attacks course htbserver side https://academy.hackthebox.com/course/preview/web-service--api-attacks Web Service & API Attacks Course | HTB Academy Web services and APIs are frequently exposed to provide certain functionalities in a programmatic way between heterogeneous devices and software components.... api attacks courseweb service https://academy.hackthebox.com/course/preview/injection-attacks Injection Attacks Course | HTB Academy This module covers three injection attacks: XPath injection, LDAP injection, and HTML injection in PDF generation libraries. While XPath and LDAP injection v... injection attacks coursehtb https://academy.hackthebox.com/course/preview/password-attacks Password Attacks Course | HTB Academy Passwords are still the primary method of authentication in corporate networks. If strong password policies are not enforced, users often choose weak, easy-t... attacks course htbpassword https://academy.hackthebox.com/course/preview/ntlm-relay-attacks NTLM Relay Attacks Course | HTB Academy attacks course htbntlm relay https://academy.hackthebox.com/course/preview/ai-data-attacks AI Data Attacks Course | HTB Academy This module explores the intersection of Data and Artificial Intelligence, exposing how vulnerabilities within AI data pipelines can be exploited, ultimately... attacks course htbai data https://academy.hackthebox.com/course/preview/supply-chain-attacks Supply Chain Attacks Course | HTB Academy This module provides a detailed overview of Supply Chain Attacks, covering hardware and software aspects. It explores the impact of supply chains, the lifecy... supply chain attackscoursehtb https://academy.hackthebox.com/course/preview/advanced-deserialization-attacks Advanced Deserialization Attacks Course | HTB Academy This module focuses on developing custom exploits for .NET deserialization vulnerabilities from a whitebox perspective. attacks course htbadvanced Sponsored https://www.bootycallz.com/ Booty Callz - World's Sexiest Black Hookup Dating @ BootyCallz.com https://academy.hackthebox.com/course/preview/detecting-access-token-manipulation-attacks Detecting Access Token Manipulation Attacks Course | HTB Academy This module focuses on Windows privilege escalation techniques through access token manipulation. It covers various topics, including Windows processes, acce... access token manipulationhtb https://academy.hackthebox.com/course/preview/whitebox-attacks Whitebox Attacks Course | HTB Academy attacks course htbwhitebox https://academy.hackthebox.com/course/preview/http-attacks HTTP Attacks Course | HTB Academy This module covers three HTTP vulnerabilities: CRLF Injection, HTTP Request Smuggling, and HTTP/2 Downgrading. These vulnerabilities can arise on the HTTP le... attacks course htbhttpacademy https://academy.hackthebox.com/course/preview/wired-equivalent-privacy-wep-attacks Wired Equivalent Privacy (WEP) Attacks Course | HTB Academy attacks course htbwiredwep https://academy.hackthebox.com/course/preview/httpstls-attacks HTTPs/TLS Attacks Course | HTB Academy This module covers details on Transport Layer Security (TLS) and how it helps to make HTTP secure with the widely used HTTPS. That includes how TLS works, ho... attacks course htbhttpstls https://academy.hackthebox.com/course/preview/llm-output-attacks LLM Output Attacks Course | HTB Academy In this module, we will explore different LLM output vulnerabilities resulting from improper handling of LLM outputs and insecure LLM applications. We will a... attacks course htbllm output https://academy.hackthebox.com/course/preview/process-injection-attacks-and-detection Process Injection Attacks and Detection Course | HTB Academy This module focuses on understanding the process injection techniques attackers use to execute malicious code within the context of legitimate processes. Thi... course htb academyprocess https://academy.hackthebox.com/course/preview/ai-evasion---sparsity-attacks AI Evasion - Sparsity Attacks Course | HTB Academy This module explores sparsity-constrained adversarial attacks that minimize the number of modified input features rather than perturbation magnitude, showing... attacks course htbaievasion Sponsored https://www.fanvue.com/ Fanvue The creator subscription platform for the future. Sign up before the end of the month and take home 85%. https://academy.hackthebox.com/course/preview/detecting-windows-attacks-with-splunk Detecting Windows Attacks with Splunk Course | HTB Academy This Hack The Box Academy module is focused on pinpointing attacks on Windows and Active Directory. Utilizing Splunk as the cornerstone for investigation, th... splunk course htbdetecting https://academy.hackthebox.com/course/preview/dacl-attacks-i DACL Attacks I Course | HTB Academy Discretionary Access Control Lists (DACLs), found within security descriptors, are a fundamental component of the security model of Windows and Active Direct... course htb academydaclattacks https://academy.hackthebox.com/course/preview/dacl-attacks-ii DACL Attacks II Course | HTB Academy In this second module on Discretionary Access Control Lists (DACLs), we delve into sophisticated attack techniques and strategies within Windows Active Direc... course htb academydaclattacks https://academy.hackthebox.com/course/preview/introduction-to-deserialization-attacks Introduction to Deserialization Attacks Course | HTB Academy In this module, we will explore deserialization attacks with specific examples in Python and PHP. attacks course htbacademy https://academy.hackthebox.com/course/preview/active-directory-enumeration--attacks Active Directory Enumeration & Attacks Course | HTB Academy Active Directory (AD) is the leading enterprise domain management suite, providing identity and access management, centralized domain administration, authent... attacks course htbactiveamp https://academy.hackthebox.com/course/preview/brief-intro-to-hardware-attacks Brief Intro to Hardware Attacks Course | HTB Academy This mini-module concisely introduces hardware attacks, covering Bluetooth risks and attacks, Cryptanalysis Side-Channel Attacks, and vulnerabilities like Sp... attacks course htbbrief intro https://academy.hackthebox.com/course/preview/api-attacks API Attacks Course | HTB Academy Web APIs serve as crucial connectors across diverse entities in the modern digital landscape. However, their extensive functionality also exposes them to a r... api attacks coursehtb academy https://academy.hackthebox.com/course/preview/active-directory-trust-attacks Active Directory Trust Attacks Course | HTB Academy Active Directory (AD) is the leading solution for organizations to provide identity and access management, centralized domain administration, authentication,... attacks course htbactivetrust https://academy.hackthebox.com/course/preview/adcs-attacks ADCS Attacks Course | HTB Academy This module focuses on privilege escalation attacks by abusing misconfigurations in Active Directory Certificate Services. attacks course htbadcsacademy https://academy.hackthebox.com/course/preview/ai-evasion---first-order-attacks AI Evasion - First-Order Attacks Course | HTB Academy This module explores gradient-based adversarial attacks that manipulate neural network inputs at inference time, showing how to craft perturbations that caus... attacks course htbfirst order https://academy.hackthebox.com/course/preview/web-attacks Web Attacks Course | HTB Academy attacks course htbwebacademy https://academy.hackthebox.com/course/preview/windows-attacks--defense Windows Attacks & Defense Course | HTB Academy Microsoft Active Directory (AD) has been, for the past 20+ years, the leading enterprise domain management suite, providing identity and access management, c... defense course htbwindowsamp https://academy.hackthebox.com/course/preview/prompt-injection-attacks Prompt Injection Attacks Course | HTB Academy This module comprehensively introduces one of the most prominent attacks on large language models (LLMs): Prompt Injection. It introduces prompt injection ba... prompt injection attackshtb https://academy.hackthebox.com/course/preview/wi-fi-evil-twin-attacks Wi-Fi Evil Twin Attacks Course | HTB Academy This module explores the concept of evil twin attacks on Wi-Fi networks, focusing on WPA2, WPA3, and WPA-Enterprise. Despite these protocols being designed w... attacks course htbwi fievil https://academy.hackthebox.com/course/preview/kerberos-attacks Kerberos Attacks Course | HTB Academy Kerberos is an authentication protocol that allows users to authenticate and access services on a potentially insecure network. Due to its prevalence through... attacks course htbkerberos https://academy.hackthebox.com/course/preview/file-upload-attacks File Upload Attacks Course | HTB Academy Arbitrary file uploads are among the most critical web vulnerabilities. These flaws enable attackers to upload malicious files, execute arbitrary commands on... attacks course htbfile upload