Changelog

Follow up on the latest improvements and updates.

RSS

Wutai
mirrors the structure, complexity, and progression of a real-world Active Directory (AD) penetration test or red team engagement. In this scenario, you’ll practice operating covertly without triggering detection mechanisms. Along the way, you'll see detections in near real time and be able to tune your actions accordingly.
After completing the 12 machines and 12 flags included in the lab, you’ll understand how initial access through weak credentials can escalate to full Enterprise Admin control while experiencing first-hand how stealthy movement, credential abuse, and certificate exploitation allow teams to test resilience without touching production.
Learning outcomes include:
  • Network & Active Directory Enumeration
  • Active Directory & Custom Exploitation
  • Active Directory Certificate Services
  • Lateral Movement across multiple Forests
  • Bypassing EDR Solutions
  • Reverse Engineering
  • Operating covertly
Screenshot 2025-10-30 at 1
Two new time-efficient Professional Lab scenarios are now live:
Sidecar
and
Push
.
Sidecar and Push are small Active Directory scenarios that simulate real-world Windows environments and contain two machines and two flags each. Sidecar simulates PKI abuse, detecting certificate-based persistence, and how shadow credentials enable stealthy lateral movement. Push covers advanced attack techniques including ClickOnce application exploitation, SCCM coercion, and ADCS exploitation via Golden Certificate attacks.
You’ll gain practical skills in:
  • Shadow credential and Kerberos attacks
  • Abusing SeTcbPrivilege privilege and .lnk files
  • Crafting malicious ClickOnce deployments
  • Coercing NTLM authentication with SCCM
  • ADCS Golden Certificate attacks
  • Advanced lateral movement techniques in Windows environments
Screenshot 2025-10-29 at 10
Screenshot 2025-10-29 at 10
We’ve just upgraded how you connect your Hack The Box (HTB) account to Discord, and made it easier than ever to get verified.
✅ No HTB Labs? No problem.
Verification now runs through your HTB Account! To connect, go to the Security Settings section of your HTB Account Portal. Scroll down to the Discord Account section and click Connect.
image
🌟 Why link your HTB Account to Discord?
  • Instantly sync your HTB username so staff and community members can spot you.
  • Show off your Hacker Rank directly on your profile.
  • Unlock member-only channels and join the inner circle on the official HTB server. All HTB Academy channels on Discord now require verification. If you’re already linked, we recommend re-linking to refresh your roles and get the latest access.
👉 Follow the updated steps in our Welcome Guide here!
ScreenRecording2025-10-24at15
We’ve given HTB Academy a major facelift to boost your learning experience. Try our Academy 2.0 (Beta) and enjoy:
  • Improved accessibility: Higher contrast, clearer focus states, better keyboard nav.
  • Smoother UX: Streamlined workflows, updated visuals, fewer distractions.
  • Mobile-friendly design: Fully optimized for phones and tablets.
  • Faster performance: Quicker load times and smooth interactions.
  • Modern tech stack: Built for speed, security, and future features.
The
AI Evasion - Sparsity Attacks
module explores sparsity-constrained adversarial attacks that minimize the number of modified input features while showing how to craft targeted misclassifications by changing only the most impactful pixels through L0-focused optimization and saliency-guided feature selection. Complete with hands-on exercises, you’ll gain a comprehensive overview of techniques that generate adversarial examples under strict sparsity constraints.
Key learning outcomes include:
  • Mathematical foundations of sparsity-constrained optimization
  • FISTA optimization for solving the non-smooth ElasticNet objective with proximal gradient descent and momentum acceleration
  • Single-pixel and pairwise JSMA variants
  • ElasticNet (EAD) and Jacobian‑based Saliency Map Attack (JSMA) paths to Sparse Perturbations
IMG_0142 (1)
New exclusive content has been released on Dedicated Labs covering intrusion detection system tooling, application-layer vulnerabilities, infrastructure-level compromises, and more.
Unveil | Exclusive Sherlock
Analyze Suricata logs from a compromised system involved in an infostealer campaign.
Screenshot 2025-10-21 at 12
Alpaca | Exclusive Machine
Alpaca is a Medium Linux machine that demonstrates arbitrary file read via prompt injection and remote code execution via CVE-2024-37032 and CVE-2024-45436 in Ollama.
Screenshot 2025-10-21 at 12
Within your CTF Organization environment, you now have the ability to explore the full Threat Range scenario library and schedule an event, all directly in the platform.
Simply sign in to the CTF platform and select “Threat Range” from the library drop-down to learn more about each scenario and to request your next event.
Want to get a first-hand look at Threat Range? Click here to see the live-fire blue team simulation environment in action.
ThreatRangelibrary-ezgif
The
AI Evasion - First Order Attacks
module provides a deep exploration of the mechanics of gradient-based evasion techniques that target neural network classifiers. Through hands-on exercises, you’ll learn how to implement and analyze key evasion techniques, including the Fast Gradient Sign Method (FGSM), Iterative FGSM (I-FGSM), and DeepFool, to develop a better understanding of how neural network classifiers can be manipulated and how to defend against such attacks.
Key learning outcomes include:
  • How to evaluate model robustness and apply defensive strategies such as adversarial training and input filtering
  • Mechanics of first-order evasion attacks, including how gradients are used to manipulate model predictions
  • Applying the concept of input perturbation norms to measure the size and impact of adversarial changes
  • Assessing the gap between model accuracy and true robustness
image
The HTB Certified Penetration Testing Specialist (CPTS) Preparation Track empowers you to master real-world offensive security skills through 16 hands-on Machines ranging from Easy to Insane.
Each Machine is designed to strengthen core penetration testing techniques, from reconnaissance and exploitation to privilege escalation, building the technical depth and practical experience needed to pass the HTB CPTS exam with confidence.
By completing the track, you gain not only exam readiness but also the proven capability to perform professional-level penetration tests in real-world environments.
Screenshot 2025-10-07 at 1
DomainLooter
is a multi-host intrusion scenario that simulates a realistic Active Directory compromise triggered by a phishing campaign. The intrusion starts with a phishing email posed as a VPN update from the company IT department. The victim unwittingly opens the attachment which establishes a C2 connection to the attacker’s infrastructure. The attacker utilises privileged access to pose as a domain controller and obtain a copy of the active directory database containing the company usernames and passwords.
The environment is composed of critical infrastructure components typically found in a corporate network including:
  • Domain Controllers
  • File & Email Server
  • Admin Workstation
  • Web Proxy
  • SIEM (Splunk)
  • User Workstation
btj9BB7Pkpur7ZoantwrsshWv0i8uKqLzFU7bZHE
Load More