Changelog

Follow up on the latest improvements and updates.

RSS

HTB CWPE is a hands-on, cloud-based certification that brings wireless security training into the modern age. Paired with the WiFi Penetration Tester Job-Role Path, it's one of the few programs to offer a holistic curriculum, real-world practice with WPA3 attacks, and doesn’t require specific hardware or complex setups.
Included in the job-role path and certification are learning material and hands-on labs that focus on how attackers actually approach wireless environments: reconnaissance, exploiting weak configurations, credential attacks, evil twins, captive portals, and full corporate Wi-Fi attack chains for anyone who wants to properly understand and test wireless security, not just check a box.
Get started with HTB CWPE here or learn more on our blog.
HTB CPWE OG Banner
The
Android Attacks
module provides a structured, hands-on introduction to the most common and impactful security risks affecting modern mobile applications. By completing the module, you will learn how mobile vulnerabilities arise, how to categorize them based on known mobile security frameworks, how they are exploited in real applications, and how to identify and remediate them using techniques learned in the previous modules.
Key learning outcomes:
  • Understanding the OWASP Mobile Top 10 and how modern mobile security risks span apps, APIs, networks, and cryptography
  • Analyzing Android application architecture to identify key mobile attack surfaces and misconfigurations
  • Identifying and exploiting Android vulnerabilities mapped to the OWASP Mobile Top 10, including auth, storage, communication, and cryptography flaws
  • Applying analysis techniques to uncover insecure storage, weak crypto, exposed components, and reverse-engineering gaps
  • Mapping mobile vulnerabilities to real attacker behaviors and applying practical remediation and hardening strategies
Android Attacks (1)
The
WMI Tradecraft Analysis
module provides a deep technical analysis of WMI tradecraft from both attacker and defender perspectives. While completing the module, you will learn how WMI is abused for execution, lateral movement, persistence, and stealthy backdoor deployment, as well as how to detect, hunt, and investigate malicious WMI activity using logs, ETW, and low-level artifacts.
Key learning outcomes:
  • Understanding WMI architecture and execution flow, including providers, namespaces, repositories, and COM-based service activation
  • Querying and analyzing WMI data using PowerShell to assess system configuration, processes, and services
  • Identifying malicious and anomalous WMI activity by examining execution context, process relationships, and remote usage patterns
  • Mapping WMI abuse to MITRE ATT&CK techniques and applying monitoring strategies to detect lateral movement, living-off-the-land execution, and persistence in Windows environments
WMI Tradecraft Analysis (1)

new

Labs

Academy

Capture The Flag

Features

HTB Account integration with LetsDefend

HTB Account has now been fully integrated into the LetsDefend platform.
What this means for Community Platform users:
  • Going forward, new registrations to LetsDefend will be available only via an HTB account
  • Existing users will have the option to link their LetsDefend account to an existing HTB account
For a short transition period, there will be two sign-in options:
  • Sign in with an existing LetsDefend account
  • Sign in via an HTB account
image (32)
image (33)
The AI Red Teamer Job Role Path, built in collaboration with Google, is now fully complete!
This path equips cybersecurity professionals with the cutting-edge skills needed to assess, exploit, and secure today’s AI-powered systems. With 12 hands-on modules aligned to Google’s Secure AI Framework (SAIF), you’ll explore everything from prompt injection and model privacy attacks to adversarial AI techniques, supply chain risks, and deployment-level threats.
As you move through the path, you’ll work through real-world AI security scenarios, learning how to influence model behavior, craft AI-specific red teaming strategies, and execute offensive security testing against AI-driven applications.
Screenshot 2025-12-08 at 1
The
AI Privacy
module introduces you to one of the most critical privacy threats in machine learning: the ability to determine whether a specific individual’s data was included in a model’s training set. You’ll explore how overfitting creates detectable behavioral signals, implement real membership inference attacks using the shadow model methodology, and apply industry‑recommended defenses such as differential privacy.
Key learning outcomes:
  • Implementing shadow models and attack classifiers to detect membership based on prediction confidence patterns
  • Understanding differential privacy and applying DP-SGD to train privacy‑preserving models
  • Using PATE to achieve privacy through architectural separation
  • Evaluating and mitigating privacy leakage across machine learning systems
Screenshot 2025-12-08 at 1
The
AI Defense
module introduces you to the strategies and techniques for protecting AI applications from attacks explored in the AI Red Teamer path. You’ll explore how to proactively harden models through adversarial training and tuning, as well as implement LLM guardrails to enforce safety and reliability at the application layer.
Key learning outcomes:
  • Understanding adversarial tuning and applying it to refine model behavior against evolving threats
  • Learning the basic concepts of LLM guardrails and implementing them at the application layer
  • Building multi-layered defenses that combine model-level and application-level safeguards
  • Designing AI applications that maintain security, reliability, and user trust against a variety of attack vectors
Screenshot 2025-12-08 at 1

new

improved

Labs

Academy

Features

HTB Jobs is officially live

Your job hunt is starting to get easier. The HTB Jobs is now a centralized hub where you can browse open opportunities from our partners, track applications, and manage recruiter messages, all in one place. This is the first of many upgrades coming to help our users build their cybersecurity career, together with HTB.
Screenshot 2025-11-27 at 16
The
Wi-Fi Penetration Testing Tools and Techniques
module introduces you to a range of Wi-Fi pentesting tools, each selected to demonstrate techniques suited for different environments and stages of an engagement. You’ll have the opportunity to work through practical examples that feature the wide variety of technologies, protocols, and security configurations encountered in the field, allowing you to gain hands-on experience in choosing and applying the right tools for your engagement.
Key learning outcomes:
  • How to conduct reconnaissance with Airodump-ng, Kismet, LinSSID, WifiDB, and Sparrow WiFi
  • Using tools such as WiGLE to conduct Open Source Intelligence
  • In-depth understanding of automated attack frameworks such as H4rpy, Wifite2, and Fern WiFi Cracker
  • How to gather and crack passwords using Pyrit, Aircrack-ng, and Pmkidcracker
Screenshot 2025-11-21 at 3
The
Attacking Corporate Wi-Fi Networks
module incorporates a simulated Wi-Fi penetration test from start to finish, emphasizing hands-on techniques that reflect real-world engagements. It involves conducting scoped reconnaissance, assessing wireless configurations, and evaluating common attack surfaces across WPA2, WPA3, and Enterprise deployments. The environment culminates in a demonstration of internal network pivoting, including Active Directory access, all performed within a controlled, simulated environment and in adherence to strict legal and ethical boundaries.
Key learning outcomes:
  • Reviewing rules of engagement and scope to prepare for authorized Wi‑Fi assessments
  • How to conduct reconnaissance, abuse guest networks, and compromise WPA2, WPA3, and Enterprise Wi‑Fi environments
  • Skills for executing advanced attacks, including Karma, Mana, router exploitation, and internal pivots
  • Understanding how how to enumerate Active Directory, escalate privileges, move laterally, and compromise the domain
Screenshot 2025-11-21 at 3
The Wi-Fi Penetration Tester Job Role Path is built for professionals and aspiring security practitioners ready to master the art of assessing and securing corporate wireless networks.
Included in this path are 10 hands-on modules that put you in the attacker’s seat evaluating Wi-Fi security, breaking modern authentication and encryption protocols, and simulating real-world threats like rogue access points, man-in-the-middle attacks, and credential harvesting.
As you progress through the material, you’ll gain practical experience with industry-standard methodologies while learning how to pinpoint vulnerabilities, exploit misconfigurations, and deliver impactful countermeasures.
Upon completing the Path, you'll have the skills and confidence to perform authorized Wi-Fi penetration tests and strengthen the wireless security posture of enterprise corporate environments.
Wi-Fi Penetration Tester (1)
The
Introduction to Linux Forensics
module covers techniques for conducting digital forensics on Linux systems prevalent in enterprise servers and cloud infrastructures. This includes an in-depth overview of the steps included in the forensics process, what scenarios require an investigation, becoming familiar with open-source and command-line tools, what types of artifacts are examined, and how to create a detailed timeline.
Key learning outcomes include:
  • In-depth understanding of digital forensics principles and maintaining chain of custody for Linux systems
  • How to locate and collect key Linux artifacts such as /var/log, bash history, cron jobs, and filesystem MACb timestamps
  • Practical skills development using Systemd Journal, Auditd, Sysmon for Linux, AVML, and Volatility 3 to avoid tampering with evidence
  • Deeper understanding of how to document and present forensic findings in a clear, reproducible, and legally defensible format
image
Load More