Changelog

Follow up on the latest improvements and updates.

RSS

new

improved

Labs

Academy

Features

HTB Jobs is officially live

Your job hunt is starting to get easier. The HTB Jobs is now a centralized hub where you can browse open opportunities from our partners, track applications, and manage recruiter messages, all in one place. This is the first of many upgrades coming to help our users build their cybersecurity career, together with HTB.
Screenshot 2025-11-27 at 16
The
Wi-Fi Penetration Testing Tools and Techniques
module introduces you to a range of Wi-Fi pentesting tools, each selected to demonstrate techniques suited for different environments and stages of an engagement. You’ll have the opportunity to work through practical examples that feature the wide variety of technologies, protocols, and security configurations encountered in the field, allowing you to gain hands-on experience in choosing and applying the right tools for your engagement.
Key learning outcomes:
  • How to conduct reconnaissance with Airodump-ng, Kismet, LinSSID, WifiDB, and Sparrow WiFi
  • Using tools such as WiGLE to conduct Open Source Intelligence
  • In-depth understanding of automated attack frameworks such as H4rpy, Wifite2, and Fern WiFi Cracker
  • How to gather and crack passwords using Pyrit, Aircrack-ng, and Pmkidcracker
Screenshot 2025-11-21 at 3
The
Attacking Corporate Wi-Fi Networks
module incorporates a simulated Wi-Fi penetration test from start to finish, emphasizing hands-on techniques that reflect real-world engagements. It involves conducting scoped reconnaissance, assessing wireless configurations, and evaluating common attack surfaces across WPA2, WPA3, and Enterprise deployments. The environment culminates in a demonstration of internal network pivoting, including Active Directory access, all performed within a controlled, simulated environment and in adherence to strict legal and ethical boundaries.
Key learning outcomes:
  • Reviewing rules of engagement and scope to prepare for authorized Wi‑Fi assessments
  • How to conduct reconnaissance, abuse guest networks, and compromise WPA2, WPA3, and Enterprise Wi‑Fi environments
  • Skills for executing advanced attacks, including Karma, Mana, router exploitation, and internal pivots
  • Understanding how how to enumerate Active Directory, escalate privileges, move laterally, and compromise the domain
Screenshot 2025-11-21 at 3
The Wi-Fi Penetration Tester Job Role Path is built for professionals and aspiring security practitioners ready to master the art of assessing and securing corporate wireless networks.
Included in this path are 10 hands-on modules that put you in the attacker’s seat evaluating Wi-Fi security, breaking modern authentication and encryption protocols, and simulating real-world threats like rogue access points, man-in-the-middle attacks, and credential harvesting.
As you progress through the material, you’ll gain practical experience with industry-standard methodologies while learning how to pinpoint vulnerabilities, exploit misconfigurations, and deliver impactful countermeasures.
Upon completing the Path, you'll have the skills and confidence to perform authorized Wi-Fi penetration tests and strengthen the wireless security posture of enterprise corporate environments.
Wi-Fi Penetration Tester (1)
The
Introduction to Linux Forensics
module covers techniques for conducting digital forensics on Linux systems prevalent in enterprise servers and cloud infrastructures. This includes an in-depth overview of the steps included in the forensics process, what scenarios require an investigation, becoming familiar with open-source and command-line tools, what types of artifacts are examined, and how to create a detailed timeline.
Key learning outcomes include:
  • In-depth understanding of digital forensics principles and maintaining chain of custody for Linux systems
  • How to locate and collect key Linux artifacts such as /var/log, bash history, cron jobs, and filesystem MACb timestamps
  • Practical skills development using Systemd Journal, Auditd, Sysmon for Linux, AVML, and Volatility 3 to avoid tampering with evidence
  • Deeper understanding of how to document and present forensic findings in a clear, reproducible, and legally defensible format
image
SoMe_CJCA-coming-back-to-Silver-Annual_v2_1200x630 (2)
Kickstart your certification journey with the Silver Annual subscription on HTB Academy. Now, we're including an extra HTB CJCA exam voucher, so you can learn the basics of cybersecurity and then proceed to the certification of your choice!
This extra voucher is also available on the Gold Annual plan.
The HTB CJCA certification was designed to help beginners break into cybersecurity with practical, hands-on training. By including it in our annual plans, we’re making it easier to go from zero to pro, all within Hack The Box.
Now, one annual subscription supports your entire certification path:
  • Kickstart your journey with HTB CJCA
  • Climb higher with our core and specialized certifications
It’s more value, more progress, and more recognition, all rolled into your HTB plan.
P.S. If you bought your Silver or Gold Annual subscription recently, don't worry! We are also adding this extra voucher for annual plan purchases after September 1, 2025.
The
Linux Process Injections & Detections
module introduces various Linux process injection techniques, from basic to advanced, from both local and remote standpoints. It focuses on how ELF sections and dynamic-linking structures can be abused for execution flow hijacking and evasion while overriding potential memory protections. It also explores the various detection opportunities and dynamic analysis techniques that can be employed for prevention and mitigation tasks.
Key learning outcomes:
  • Understand key ELF structures and procfs pseudo-files commonly involved in process injection techniques
  • Explore techniques such as return address overwriting and stack based hijacking used in binary exploitation
  • Learn how to use the ptrace syscall offensively and defensively
  • Discover how auditd can support detection and analysis of process injection techniques
1200x630 - Linux Process Injections & Detections
We’ve just upgraded how you connect your Hack The Box (HTB) account to Discord, and made it easier than ever to get verified.
✅ No HTB Labs? No problem.
Verification now runs through your HTB Account! To connect, go to the Security Settings section of your HTB Account Portal. Scroll down to the Discord Account section and click Connect.
image
🌟 Why link your HTB Account to Discord?
  • Instantly sync your HTB username so staff and community members can spot you.
  • Show off your Hacker Rank directly on your profile.
  • Unlock member-only channels and join the inner circle on the official HTB server. All HTB Academy channels on Discord now require verification. If you’re already linked, we recommend re-linking to refresh your roles and get the latest access.
👉 Follow the updated steps in our Welcome Guide here!
ScreenRecording2025-10-24at15
We’ve given HTB Academy a major facelift to boost your learning experience. Try our Academy 2.0 (Beta) and enjoy:
  • Improved accessibility: Higher contrast, clearer focus states, better keyboard nav.
  • Smoother UX: Streamlined workflows, updated visuals, fewer distractions.
  • Mobile-friendly design: Fully optimized for phones and tablets.
  • Faster performance: Quicker load times and smooth interactions.
  • Modern tech stack: Built for speed, security, and future features.
The
AI Evasion - Sparsity Attacks
module explores sparsity-constrained adversarial attacks that minimize the number of modified input features while showing how to craft targeted misclassifications by changing only the most impactful pixels through L0-focused optimization and saliency-guided feature selection. Complete with hands-on exercises, you’ll gain a comprehensive overview of techniques that generate adversarial examples under strict sparsity constraints.
Key learning outcomes include:
  • Mathematical foundations of sparsity-constrained optimization
  • FISTA optimization for solving the non-smooth ElasticNet objective with proximal gradient descent and momentum acceleration
  • Single-pixel and pairwise JSMA variants
  • ElasticNet (EAD) and Jacobian‑based Saliency Map Attack (JSMA) paths to Sparse Perturbations
IMG_0142 (1)
The
AI Evasion - First Order Attacks
module provides a deep exploration of the mechanics of gradient-based evasion techniques that target neural network classifiers. Through hands-on exercises, you’ll learn how to implement and analyze key evasion techniques, including the Fast Gradient Sign Method (FGSM), Iterative FGSM (I-FGSM), and DeepFool, to develop a better understanding of how neural network classifiers can be manipulated and how to defend against such attacks.
Key learning outcomes include:
  • How to evaluate model robustness and apply defensive strategies such as adversarial training and input filtering
  • Mechanics of first-order evasion attacks, including how gradients are used to manipulate model predictions
  • Applying the concept of input perturbation norms to measure the size and impact of adversarial changes
  • Assessing the gap between model accuracy and true robustness
image
Load More