Changelog

Follow up on the latest improvements and updates.

RSS

HTB Academy now exclusively uses HTB Account for login and registration, providing a seamless and unified experience across all HTB platforms.
This change enhances security, simplifies access, and ensures better integration within the HTB ecosystem.
image
Three (3) new exclusive Machines just landed in Dedicated Labs, focusing on phishing, privilege escalation, and CVE exploitation.
GoneFishingTwo
Master Phishing and 2FA Bypass by leveraging a reverse proxy as a Man-in-the-Middle attack. If you haven't explored “GoneFishing” yet, start there for a smoother learning experience!
EdgeAI
Learn to exploit CVEs in real-world applications like Qdrant (CVE-2024-3829) and LocalAI (CVE-2024-2029) to gain a foothold, escalate privileges, and achieve root access.
OffBiz
Understand how CVE exploitation can impact financial applications by leveraging CVE-2024-36104 to execute unauthenticated remote code execution on Apache OFBiz.
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
HTB_DedicatedLabs_NewMachines_FEB25_1200x675

new

Capture The Flag

Offensive

Defensive

New CTF packs for AI, malware, and coding

Three (3) new Essentials CTF packs have just dropped, each designed to sharpen your expertise in critical cybersecurity areas.
Our first AI security CTF pack is designed for security professionals and AI engineers to develop expertise in exploiting AI vulnerabilities through prompt injection. With 10 hands-on Challenges, participants will learn to manipulate AI-generated responses, extract sensitive data, and uncover real-world risks in AI-powered systems, strengthening their ability to enhance AI security.
Designed for incident responders and malware analysts, this pack builds core skills in malware analysis, reverse engineering, and threat mitigation. Through 10 new Challenges, participants gain hands-on experience with static and dynamic analysis, cryptographic decryption, and behavioral forensics to enhance threat detection and incident response.
Designed for engineers and technical professionals, this pack introduces 8 coding-based Challenges that build problem-solving skills and structured thinking, making cybersecurity more accessible. By bridging the gap between software engineering and cybersecurity, it prepares teams for real-world security challenges while fostering a seamless transition into security-focused roles.
image
A developer’s system has been compromised — but how? It’s up to you to investigate, uncover the attacker's tactics, and sharpen your Windows forensics skills.
What you’ll learn:
  • Extract and analyze key artifacts from a Windows system
  • Identify suspicious processes and trace the attacker's entry point
  • Reconstruct the breach timeline using real-world DFIR techniques
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
Want to add new defensive skills to your utility kit?
Login to HTB Labs today →
1200x675
Even the strongest Wi-Fi security protocols — WPA2, WPA3, and WPA-Enterprise — are vulnerable to Evil Twin attacks. Attackers can exploit human trust and rogue access points to intercept sensitive data.
In this new Academy Module, you’ll learn:
  • How attackers bypass Wi-Fi security to compromise users
  • Manual & automated techniques for executing Evil Twin attacks
  • Advanced MiTM tactics like DNS spoofing & SSL interception — and how to stop them
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
Ready for your skills to do the talking at your next interview?
Head to HTB Academy and start learning today →
1200x675 - New Module
As the Sherlocks library expands, finding the right defensive scenarios can become challenging.
That’s why we’ve introduced new filtering options on the Sherlocks page, making it easier for administrators to manage Dedicated Lab Spaces efficiently.
Admins can now filter by
difficulty, Sherlock type,
and
category
, allowing them to quickly set up team practice with the most relevant challenges while saving time when searching for new content.
👇 Check out how to make your lab management smoother than ever.
Sherlock filtering options (1)
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
Easily track and access upcoming releases within Dedicated Labs, ensuring you’re always fully aligned with the latest content as it’s released.
For admins: Simplified content planning
Ready for fresh material? Explore upcoming scenario releases while managing your Space, making it easier to plan your training sessions. Add new content to your workspace in advance and assign the latest challenges the moment they drop!
For users: Fine-tune your learning goals
Curious about what’s next in your training? Now you can preview your soon-to-be-released assigned content, adjust your goals, and stay motivated to dive into the newest content as soon as it’s live.
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
Screenshot 2025-02-17 at 6
A sophisticated rootkit lurks in Linux servers, creating persistent abnormal traffic and covert communication breaches.
Complete the latest Sherlock to strengthen your DFIR skills by:
  • Analyzing a malicious kernel module and its system interactions
  • Detecting hidden activities and abnormal traffic patterns
  • Uncovering stealth techniques used by advanced attackers
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
Want to add new defensive skills to your utility kit?
Login to HTB Labs today →
HTB_sherlocks_APTNightmare-2_1200x675
A strong grasp of network fundamentals is vital for effectively identifying vulnerabilities and securing systems, making it an essential skill for anyone committed to safeguarding digital environments.
Dive into the latest Academy Module and gain a deeper understanding of:
  • Different types of networks, including LANs (Local Area Networks) and WANs (Wide Area Networks)
  • The OSI (Open Systems Interconnection) and TCP/IP models, including how data flows through networks
  • Key components such as routers and servers
  • The fundamentals of IP addressing and subnetting
  • Basic principles of network security
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
Ready for your skills to do the talking at your next interview?
Head to Academy and start learning about networking today →
New Module - Network Foundations_1200x675 - New Module
Put your XSS skills to the test by counter-hacking a catfish account on a dating app in today’s OnlyHacks Challenge available on HTB Labs.
What you’ll learn:
  • Exploit Cross-Site Scripting (XSS) in a real-world scenario
  • Understand how attackers manipulate user input on web applications
Ready to swipe right on hacking this Valentine’s Day?
Head to HTB Labs and start practicing today →
image
Load More