https://academy.hackthebox.com/course/preview/attacking-common-applications
Penetration Testers can come across various applications, such as Content Management Systems, custom web applications, internal portals used by developers an...
attackingcommonapplicationscoursehtb
https://www.hackthebox.com/hacker/blue-team-labs-for-dfir
Become a job-market-ready blue teamer with DFIR & incident response practice labs that simulate real-world cybersecurity incidents
blue teamincident responsedfiramplabs
https://academy.hackthebox.com/news/the-student-sub-for-htb-academy-has-landed
The "Student Sub" for HTB Academy has landed! Content | HTB Academy News
quotstudentsubhtbacademy
https://www.qssupplies.co.uk/bathroom-furniture-shower-taps/322997.htm
The Thermosphere 12V Vertical Single Heated Towel Bar is made using stainless steel and features a polished finish. MFC Code: HTB-VR-900.
towel barstainless steelsingleelectrichtb
https://academy.hackthebox.com/course/preview/active-directory-hardening---recon--initial-access
Active Directory (AD) presents a vast attack surface and can be challenging to secure and control. Small changes can have a cascading effect, introducing fur...
active directoryinitial accesshardeningreconamp
https://academy.hackthebox.com/course/preview/linux-fundamentals
This module covers the fundamentals required to work comfortably with the Linux operating system and shell.
fundamentals courselinuxhtbacademy
https://academy.hackthebox.com/course/preview/introduction-to-c
Introduction to C# aims to provide a solid foundation to understand and work with C# code. Covering the crucial foundations and more intricate concepts, prov...
introductioncoursehtbacademy
https://academy.hackthebox.com/preview/certifications/htb-certified-defensive-security-analyst
HTB Certified Defensive Security Analyst Certificate
security analysthtbcertifieddefensive
https://www.hackthebox.com/cybersecurity-resources/guides-and-templates
Download actionable guides and templates to streamline security operations, compliance, and skill-building.
cybersecurity guidesamp templateshtb
https://academy.hackthebox.com/course/preview/using-web-proxies
Web application penetration testing frameworks are an essential part of any web penetration test. This module will teach you two of the best frameworks: Burp...
usingwebproxiescoursehtb
https://academy.hackthebox.com/course/preview/intro-to-whitebox-pentesting
Whitebox penetration testing enables thorough testing to identify various hard-to-find vulnerabilities. This module covers the process of whitebox pentesting...
introwhiteboxpentestingcoursehtb
https://academy.hackthebox.com/path/preview/crest-cpsacrt-preparation
This is a skill path to prepare you for CREST's CPSA and CRT exams. The following CPSA/CRT syllabus areas (IDs) are covered: A1, A2, A3, A4, A5, B1, B4,...
crestcrtpreparationskillpath
https://academy.hackthebox.com/course/preview/attacking-common-services
Organizations regularly use a standard set of services for different purposes. It is vital to conduct penetration testing activities on each service internal...
attackingcommonservicescoursehtb
https://academy.hackthebox.com/course/preview/game-hacking-fundamentals
This module serves as an introduction to fundamental Game Hacking concepts. You will learn how to find and change memory values in a running game as well as...
fundamentals coursegamehackinghtbacademy
https://academy.hackthebox.com/course/preview/intro-to-network-traffic-analysis
Network traffic analysis is used by security teams to monitor network activity and look for anomalies that could indicate security and operational issues. O...
traffic analysisintronetworkcoursehtb
https://academy.hackthebox.com/path/preview/junior-cybersecurity-analyst
The Junior Cybersecurity Analyst Job Role Path is the first step to enter and gain practical, hands-on experience in the cybersecurity field. This path cover...
cybersecurity analystjuniorjobrolepath
https://www.hackthebox.com/blog/university-of-south-florida-breaks-down-barriers-to-cyber-education-with-htb
Learn more about how USF students and professors are using Hack The Box to build cyber skills and long-lasting connections.
south floridauniversitybreaksbarrierscyber
https://academy.hackthebox.com/course/preview/windows-privilege-escalation
After gaining a foothold, elevating our privileges will provide more options for persistence and may reveal information stored locally that can further our a...
privilege escalationwindowscoursehtbacademy
https://academy.hackthebox.com/course/preview/malicious-document-analysis
This module is focussed on understanding different document formats, and techniques for identifying and analyzing the threats posed by malicious documents. B...
document analysismaliciouscoursehtbacademy
https://academy.hackthebox.com/course/preview/applications-of-ai-in-infosec
This module is a practical introduction to building AI models that can be applied to various infosec domains. It covers setting up a controlled AI environmen...
applicationsaiinfoseccoursehtb
https://academy.hackthebox.com/course/preview/introduction-to-digital-forensics
Dive into Windows digital forensics with Hack The Box Academy's "Introduction to Digital Forensics" module. Gain mastery over core forensic...
digital forensicsintroductioncoursehtbacademy
https://academy.hackthebox.com/news/new-soc-analyst-job-role-path
New SOC Analyst job-role path Content | HTB Academy News
newsocanalystjobrole
https://academy.hackthebox.com/course/preview/using-the-metasploit-framework
The Metasploit Framework is an open-source set of tools used for network enumeration, attacks, testing security vulnerabilities, evading detection, performin...
usingmetasploitframeworkcoursehtb
https://academy.hackthebox.com/course/preview/server-side-attacks
A backend that handles user-supplied input insecurely can lead to devastating security vulnerabilities such as sensitive information disclosure and remote co...
serversideattackscoursehtb
https://academy.hackthebox.com/course/preview/cross-site-scripting-xss
Cross-Site Scripting (XSS) vulnerabilities are among the most common web application vulnerabilities. An XSS vulnerability may allow an attacker to execute a...
crosssitescriptingxsscourse
https://academy.hackthebox.com/course/preview/security-incident-reporting
Tailored to provide a holistic understanding, this Hack The Box Academy module ensures participants are adept at identifying, categorizing, and documenting s...
security incidentreportingcoursehtbacademy
https://www.hackthebox.com/cybersecurity-resources/learn-with-htb
Master cybersecurity fundamentals for blue & red teaming. Level up your career.
video serieswatchlevelcareerhtb
https://academy.hackthebox.com/path/preview/basic-toolset
In this path, modules cover the basic tools needed to be successful in network and web application penetration testing. This is not an exhaustive listing of...
basictoolsetskillpathhtb
https://academy.hackthebox.com/course/preview/blind-sql-injection
In this module, we cover blind SQL injection attacks and MSSQL-specific attacks.
sql injectionblindcoursehtbacademy
https://academy.hackthebox.com/course/preview/web-requests
This module introduces the topic of HTTP web requests and how different web applications utilize them to communicate with their backends.
webrequestscoursehtbacademy
https://academy.hackthebox.com/course/preview/detecting-access-token-manipulation-attacks
This module focuses on Windows privilege escalation techniques through access token manipulation. It covers various topics, including Windows processes, acce...
access tokendetectingmanipulationattackscourse
https://academy.hackthebox.com/course/preview/windows-low-level-detectability
This module introduces user-mode threat detection on Windows, focusing on low-level techniques and dynamic analysis. It covers the Win32 API, Windows Interna...
windowslowlevelcoursehtb
https://academy.hackthebox.com/preview/certifications/htb-certified-web-exploitation-specialist
HTB Certified Web Exploitation Specialist Certificate
htbcertifiedwebexploitationspecialist
https://academy.hackthebox.com/path/preview/intro-to-binary-exploitation
Binary exploitation is a core tenet of penetration testing, but learning it can be daunting. This is mainly due to the complexity of binary files and their u...
introbinaryexploitationskillpath
https://academy.hackthebox.com/course/preview/android-application-static-analysis
This module provides a comprehensive introduction to the static analysis of Android applications—an essential skill for mobile security professionals,...
static analysisandroidapplicationcoursehtb
https://academy.hackthebox.com/course/preview/introduction-to-information-security
This theoretical module provides a comprehensive introduction to the foundational components of information security, focusing on the structure and operation...
information securityintroductioncoursehtbacademy
https://academy.hackthebox.com/course/preview/yara--sigma-for-soc-analysts
This Hack The Box Academy module covers how to create YARA rules both manually and automatically and apply them to hunt threats on disk, live processes, memo...
yaraampsigmasocanalysts
https://academy.hackthebox.com/course/preview/learning-process
The learning process is one of the essential and most important components that is often overlooked. This module does not teach you techniques to learn but d...
learning processcoursehtbacademy
https://academy.hackthebox.com/path/preview/soc-analyst
The SOC Analyst Job Role Path is for newcomers to information security who aspire to become professional SOC analysts. This path covers core security monitor...
socanalystjobrolepath
https://academy.hackthebox.com/path/preview/senior-web-penetration-tester
The Senior Web Penetration Tester Job Role Path is designed for individuals who aim to develop skills in identifying advanced and hard-to-find web vulnerabil...
seniorwebpenetrationtesterjob
https://academy.hackthebox.com/course/preview/active-directory-trust-attacks
Active Directory (AD) is the leading solution for organizations to provide identity and access management, centralized domain administration, authentication,...
active directorytrustattackscoursehtb
https://academy.hackthebox.com/course/preview/intro-to-academy
Your first stop in Hack The Box Academy to become acquainted with the platform, its features, and its learning process.
introacademycoursehtb
https://www.hackthebox.com/hacker/seasons
Hack The Box Seasons levels the playing field for both HTB veterans and beginners. Dominate the leaderboard, win great prizes, and level up your skills!
htbseasonscompetebesttest
https://academy.hackthebox.com/course/preview/ntlm-relay-attacks
The NTLM authentication protocol is commonly used within Windows-based networks to facilitate authentication between clients and servers. However, NTLM's...
ntlmrelayattackscoursehtb
https://academy.hackthebox.com/course/preview/dns-enumeration-using-python
As a penetration tester or red teamer, it is imperative that we understand the tools that we use inside and out and also have the ability to write out own, e...
dnsenumerationusingpythoncourse
https://academy.hackthebox.com/course/preview/mssql-exchange-and-sccm-attacks
This module covers attacks targeting tightly incorporated technologies in Active Directory environments such as MSSQL, Exchange, and SCCM, and how to identif...
mssqlexchangesccmattackscourse
https://academy.hackthebox.com/course/preview/attacking-enterprise-networks
We often encounter large and complex networks during our assessments. We must be comfortable approaching an internal or external network, regardless of the s...
enterprise networksattackingcoursehtbacademy
https://academy.hackthebox.com/course/preview/incident-handling-process
Security Incident handling has become a vital part of every organization's defensive strategy, as attacks constantly evolve and successful compromises are...
incidenthandlingprocesscoursehtb
https://academy.hackthebox.com/course/preview/attacking-ai---application-and-system
In this module, we will explore security vulnerabilities in the application and system components of AI deployments. We will also discuss the Model Context P...
ai applicationattackingsystemcoursehtb
https://academy.hackthebox.com/course/preview/attacking-wpawpa2-wi-fi-networks
This module explores the security challenges of WPA and WPA2 Wi-Fi networks, focusing on WPA/WPA2-Personal and WPA/WPA2-Enterprise. Although these protocols...
wi fiattackingwpanetworkscourse
https://academy.hackthebox.com/course/preview/ai-evasion---first-order-attacks
This module explores gradient-based adversarial attacks that manipulate neural network inputs at inference time, showing how to craft perturbations that caus...
first orderaievasionattackscourse
https://academy.hackthebox.com/course/preview/attacking-corporate-wi-fi-networks
This module incorporates a simulated Wi-Fi penetration test from start to finish, emphasizing hands-on techniques that reflect real-world engagements. It inv...
wi fiattackingcorporatenetworkscourse
https://academy.hackthebox.com/course/preview/cracking-passwords-with-hashcat
This module covers the fundamentals of password cracking using the Hashcat tool.
crackingpasswordscoursehtbacademy
https://academy.hackthebox.com/course/preview/web-attacks
This module covers three common web vulnerabilities, HTTP Verb Tampering, IDOR, and XXE, each of which can have a significant impact on a company's...
webattackscoursehtbacademy
https://academy.hackthebox.com/course/preview/introduction-to-deserialization-attacks
In this module, we will explore deserialization attacks with specific examples in Python and PHP.
introductionattackscoursehtbacademy
https://academy.hackthebox.com/course/preview/ai-evasion---sparsity-attacks
This module explores sparsity-constrained adversarial attacks that minimize the number of modified input features rather than perturbation magnitude, showing...
aievasionsparsityattackscourse
https://academy.hackthebox.com/course/preview/stack-based-buffer-overflows-on-linux-x86
Buffer overflows are common vulnerabilities in software applications that can be exploited to achieve remote code execution (RCE) or perform a Denial-of-Serv...
stackbasedbufferoverflowslinux
https://www.hackthebox.com/cybersecurity-resources/community-amas
Get insider insights from security experts in live AMA sessions. Ask questions, learn from pros, and enhance your cyber skills.
htbcommunityamas
https://academy.hackthebox.com/course/preview/supply-chain-attacks
This module provides a detailed overview of Supply Chain Attacks, covering hardware and software aspects. It explores the impact of supply chains, the lifecy...
supply chain attackscoursehtbacademy
https://academy.hackthebox.com/course/preview/introduction-to-networking
As an information security professional, a firm grasp of networking fundamentals and the required components is necessary. Without a strong foundation in net...
introductionnetworkingcoursehtbacademy
https://academy.hackthebox.com/course/preview/bug-bounty-hunting-process
Bug bounty programs encourage security researchers to identify bugs and submit vulnerability reports. Getting into the world of bug bounty hunting without an...
bug bountyhuntingprocesscoursehtb
https://www.hackthebox.com/blog/customer-story-nviso
NVISO provides a broad spectrum of upskilling opportunities to employees - creating skills pathways in minutes (instead of days) with HTB's enterprise...
enterprise platformnvisostaysthreatready
https://academy.hackthebox.com/course/preview/macos-fundamentals
This module covers the fundamentals required to work comfortably within the macOS operating system and shell.
fundamentals coursemacoshtbacademy
https://academy.hackthebox.com/course/preview/abusing-http-misconfigurations
This module covers three common HTTP vulnerabilities: Web Cache Poisoning, Host Header Vulnerabilities, and Session Puzzling or Session Variable Overloading....
abusinghttpcoursehtbacademy
https://academy.hackthebox.com/path/preview/local-privilege-escalation
Privilege escalation is a vital phase of the penetration testing process, one we may revisit multiple times during an engagement. During our assessments, we...
privilege escalationlocalskillpathhtb
https://academy.hackthebox.com/course/preview/active-directory-ldap
This module provides an overview of Active Directory (AD), introduces core AD enumeration concepts, and covers enumeration with built-in tools.
active directory ldapcoursehtbacademy
https://academy.hackthebox.com/course/preview/kerberos-attacks
Kerberos is an authentication protocol that allows users to authenticate and access services on a potentially insecure network. Due to its prevalence through...
kerberosattackscoursehtbacademy
https://academy.hackthebox.com/course/preview/parameter-logic-bugs
This 'secure coding' module teaches how to identify logic bugs through code review and analysis, and covers three types of logic bugs caused by user...
parameterlogicbugscoursehtb
https://academy.hackthebox.com/news/access-a-new-job-role-path-with-a-gold-annual-plan
Access a new job-role path with a Gold Annual plan Content | HTB Academy News
new jobaccessrolepathgold
https://academy.hackthebox.com/course/preview/injection-attacks
This module covers three injection attacks: XPath injection, LDAP injection, and HTML injection in PDF generation libraries. While XPath and LDAP injection v...
injectionattackscoursehtbacademy
https://academy.hackthebox.com/course/preview/dacl-attacks-i
Discretionary Access Control Lists (DACLs), found within security descriptors, are a fundamental component of the security model of Windows and Active Direct...
attackscoursehtbacademy
https://resources.hackthebox.com/become-an-htb-subject-matter-expert
HTB SMEs have expert insights featured on blogs, newsletters, webinars, and more–reaching an audience of over 2.7 million!
becomehtbsubjectmatterexpert
https://academy.hackthebox.com/course/preview/intro-to-c2-operations-with-sliver
Active Directory is present in over 90% of corporate environments and it is the prime target for attacks. This module covers the attack chain from getting th...
introoperationsslivercoursehtb
https://academy.hackthebox.com/course/preview/brief-intro-to-hardware-attacks
This mini-module concisely introduces hardware attacks, covering Bluetooth risks and attacks, Cryptanalysis Side-Channel Attacks, and vulnerabilities like Sp...
briefintrohardwareattackscourse
https://academy.hackthebox.com/course/preview/http-attacks
This module covers three HTTP vulnerabilities: CRLF Injection, HTTP Request Smuggling, and HTTP/2 Downgrading. These vulnerabilities can arise on the HTTP le...
httpattackscoursehtbacademy
https://academy.hackthebox.com/course/preview/secure-coding-101-javascript
Learn how to improve your JavaScript code's security through Code Review, Static/Dynamic Analysis, Vulnerability Identification, and Patching.
secure codingjavascriptcoursehtbacademy
https://academy.hackthebox.com/course/preview/httpstls-attacks
This module covers details on Transport Layer Security (TLS) and how it helps to make HTTP secure with the widely used HTTPS. That includes how TLS works, ho...
httpstlsattackscoursehtb
https://academy.hackthebox.com/course/preview/windows-api-monitoring-and-hooking
This module introduces the monitoring and hooking techniques for Windows APIs. These techniques are used in debugging, reverse engineering, malware analysis,...
windows apimonitoringhookingcoursehtb
https://academy.hackthebox.com/course/preview/active-directory-enumeration--attacks
Active Directory (AD) is the leading enterprise domain management suite, providing identity and access management, centralized domain administration, authent...
active directoryenumerationampattackscourse
https://academy.hackthebox.com/course/preview/advanced-xss-and-csrf-exploitation
Modern web browsers and applications utilize a variety of security measures to protect against CSRF and XSS vulnerabilities, rendering their exploitation mor...
advancedxsscsrfexploitationcourse
https://academy.hackthebox.com/course/preview/linux-privilege-escalation
Privilege escalation is a crucial phase during any security assessment. During this phase, we attempt to gain access to additional users, hosts, and resource...
privilege escalationlinuxcoursehtbacademy
https://academy.hackthebox.com/course/preview/stack-based-buffer-overflows-on-windows-x86
This module is your first step into Windows Binary Exploitation, and it will teach you how to exploit local and remote buffer overflow vulnerabilities on Win...
stackbasedbufferoverflowswindows
https://academy.hackthebox.com/path/preview/wi-fi-penetration-tester
The Wi-Fi Penetration Tester Job Role Path is designed for professionals and aspiring security practitioners who want to build expertise in assessing and sec...
wi fipenetrationtesterjobrole
https://academy.hackthebox.com/course/preview/android-application-malware-analysis
This module offers a hands-on introduction to the world of Android malware analysis. It covers common malware types, the ways they abuse system permissions,...
malware analysisandroidapplicationcoursehtb
https://academy.hackthebox.com/course/preview/wi-fi-password-cracking-techniques
Password cracking is a cornerstone of wireless penetration testing, as many real-world assessments hinge on the strength of the Wi-Fi password and our abilit...
wi fipassword crackingtechniquescoursehtb
https://academy.hackthebox.com/academy-lab-relations
See the related HTB Machines for any HTB Academy module and vice versa
maphtbacademymodulesmachines
https://academy.hackthebox.com/course/preview/windows-lateral-movement
Windows lateral movement involves techniques to navigate and control remote systems within a network, primarily after gaining initial access. It is crucial i...
lateral movementwindowscoursehtbacademy
https://academy.hackthebox.com/course/preview/shells--payloads
Gain the knowledge and skills to identify and use shells & payloads to establish a foothold on vulnerable Windows & Linux systems. This module utilizes...
shellsamppayloadscoursehtb
https://academy.hackthebox.com/course/preview/documentation--reporting
Proper documentation is paramount during any engagement. The end goal of a technical assessment is the report deliverable which will often be presented to a...
documentationampreportingcoursehtb
https://academy.hackthebox.com/course/preview/attacking-wi-fi-protected-setup-wps
In this module, we delve into the intricacies of WPS, uncovering the common vulnerabilities that plague this technology. From brute-force attacks to more sop...
wi fiattackingprotectedsetupwps
https://academy.hackthebox.com/course/preview/user-behavior-forensics
This module covers the critical aspects of user behavior analysis by exploring Windows artifacts. It is specifically designed for digital forensic analysts,...
user behaviorforensicscoursehtbacademy
https://academy.hackthebox.com/path/preview/active-directory-enumeration
Active Directory (AD) is widely used by companies across all verticals/sectors, non-profits, government agencies, and educational institutions of all sizes....
active directoryenumerationskillpathhtb
https://academy.hackthebox.com/course/preview/wired-equivalent-privacy-wep-attacks
In this module, we delve into Wired Equivalent Privacy (WEP) and the various attacks that can compromise it. We'll explore how to identify access points...
wiredequivalentprivacyattackscourse