Changelog

Follow up on the latest improvements and updates.

RSS

new

Labs

Academy

Capture The Flag

HTB Profile is now live

HTB Profile introduces a centralized view of your achievements and skills across Hack The Box platforms.
With the HTB Profile, you can:
  • Create a complete overview of your acquired skillset, inside and outside of HTB
  • Track certifications, CTF events, and all HTB achievements in one place.
  • Access an automatically updated profile based on platform activity.
  • Share your profile with peers and recruiters
Learn more about it here.
Screenshot 2026-02-13 at 18
New advanced filters have been added to the retired tabs to improve content discovery across
Machines, Sherlocks, and Challenges.
With this update, users can:
  • Filter by vulnerability, area of interest, language, or technique.
  • Combine multiple filters for more precise results.
  • Share filtered views via URL with teammates.
This enhancement reduces search time and improves navigation across HTB Labs content.
image (15)
New stats have been added to the HTB Labs profile tab to improve visibility into user progress.
This update includes:
  • A chronological overview of machine completions
  • A difficulty breakdown visualization using progress rings
  • Centralized tracking for Pro Labs, Mini Pro Labs, and Fortresses
image (17)

new

Capture The Flag

Defensive

Analyze hidden binaries with new CTF Pack

The APT28 Reversing - Essentials pack focuses on APT28-style binaries that execute quietly, delegate work to trusted system components, and only activate under specific conditions.
Included in this pack are 10 challenges that progress from foundational techniques (LD_PRELOAD injection, geofencing) through intermediate skills (protocol analysis, covert channels, payload extraction) to advanced topics (anti-tampering, firmware analysis, modern language reversing). Each binary represents real APT28 operational techniques including supply chain compromise, location-based activation, integrity verification, and evasion through legitimate system mechanisms.
By completing this pack, you will master APT-level evasion techniques, develop advanced reverse engineering skills, learn modern malware analysis, recognize nation-state tradecraft, and more.
Screenshot 2026-02-10 at 2
The Privilege Escalation Tradecraft Analysis module covers the analytical study of privilege escalation tradecraft on Windows, from its role in the attack lifecycle to how it can be detected and investigated. While completing this module, you will analyze real-world techniques and exploits to understand how they work internally and learn how to translate this knowledge into effective and reliable detection strategies.
Key learning outcomes:
  • Exploring where Windows privilege escalation fits within the attack lifecycle and how elevated access enables attacker objectives
  • Breaking down Windows privilege escalation tradecraft by examining abuse of UAC, access tokens, services, kernel drivers, and COM infrastructure
  • Recognizing and deconstructing real-world Windows privilege escalation techniques, including UAC bypasses, access token manipulation, and service account abuse
  • Leveraging reverse engineering, debugging, and API call flow analysis to reveal how privilege escalation exploits function under the hood
  • Connecting privilege escalation behavior to MITRE ATT&CK and converting technical insight into practical detection, investigation, and response strategies
Privilege Escalation Tradecraft Analysis

new

Labs

Enterprise

Offensive

OWASP Top 10 2025 Track now available

The Hack The Box OWASP Top 10 2025 track introduces you to the most critical web application security risks facing modern applications.
Included in the track are 10 hands-on challenges ranging from Very Easy to Medium that have been aligned with the latest OWASP Top 10. By completing these challenges, you will learn how to identify and exploit common vulnerabilities, strengthening your ability to assess web applications in real-world environments.
Challenges include scenarios where you will uncover potential vulnerabilities, secure critical intelligence, infiltrate digital systems, analyze platform architecture, and more.
Screenshot 2026-02-06 at 9
The
Offensive AI Security - Enhanced
pack is designed to provide essential training that prepares teams to identify vulnerabilities before adversaries exploit them in production environments.
Each challenge in this pack represents a real vulnerability class from OWASP LLM Top 10, OWASP ML Top 10, and cutting-edge AI security research, requiring participants to exploit everything from access control systems and financial authorization to ML classifiers and federated learning networks.
The first seven challenges focus on practical LLM exploitation using prompt injection, agent manipulation, and MCP server attacks - techniques accessible to traditional penetration testers. The final four challenges introduce ML model attacks including adversarial examples, gradient leakage, federated learning backdoors, and LoRA artifact exploitation for those ready to advance.
Screenshot 2026-01-30 at 12
HTB CWPE is a hands-on, cloud-based certification that brings wireless security training into the modern age. Paired with the WiFi Penetration Tester Job-Role Path, it's one of the few programs to offer a holistic curriculum, real-world practice with WPA3 attacks, and doesn’t require specific hardware or complex setups.
Included in the job-role path and certification are learning material and hands-on labs that focus on how attackers actually approach wireless environments: reconnaissance, exploiting weak configurations, credential attacks, evil twins, captive portals, and full corporate Wi-Fi attack chains for anyone who wants to properly understand and test wireless security, not just check a box.
Get started with HTB CWPE here or learn more on our blog here.
HTB CPWE OG Banner
Three new Professional Lab scenarios are now available on the HTB Enterprise Platform!
Shinra
is a medium-difficulty scenario that includes 14 machines and 12 flags focused on operating covertly without triggering detection mechanisms. The scenario demonstrates how covert techniques can bypass EDR, avoid SOC detection, and abuse trusted systems, highlighting the real business risk of advanced threats and why continuous testing, visibility, and resilience are critical to protecting core operations and critical infrastructure.
Screenshot 2026-01-28 at 8
Reflection
is a hard-difficulty, time-efficient Active Directory scenario that includes 3 machines and 3 flags which simulate a vulnerable enterprise environment and challenges users to progress from limited access to Domain Administrator. This scenario demonstrates how a small, everyday security mistake can escalate into full control of an organization’s systems, putting users, data, and business operations at risk without the need for advanced attacks.
Screenshot 2026-01-28 at 8
Trusted
is a hard-difficulty, time-efficient Active Directory scenario with 2 machines and 2 flags designed around an internal red team engagement on Trusted Inc. This scenario shows how a small, easily overlooked issue can grow into a complete enterprise takeover.
Screenshot 2026-01-28 at 8
The
OSINT APT Essentials
pack is designed to help SOC analysts, incident responders, and developers get comfortable with CTFs using pure OSINT before touching exploits or malware.
This pack introduces 10 pure OSINT challenges built from real-world nation-state APT operations, using only public sources (MITRE ATT&CK, VirusTotal, ThreatFox, vendor reports). Throughout the 10 challenges in the pack, teams will expand analytical capabilities beyond daily alerts, giving Tier 1 and 2 analysts the exact skills needed to produce real attribution reports in addition to establishing the foundational OSINT workflow required by government agencies, MSSPs, and Fortune-500 CTI teams.
Screenshot 2026-01-27 at 1
Load More