Changelog

Follow up on the latest improvements and updates.

RSS

Upgrading to
LTI version 1.3
brings significant benefits for our customers and partners. By being LTI 1.3 compliant, Hack The Box offers a more secure, seamless, and feature-rich integration. Key benefits include:
  • Stronger Security & Privacy
  • Seamless SSO
  • Unified Learning Experience
  • Automated Progress Sync
  • Integration & Content Discoverability
  • Reduced Integration Cost/Effort
LTI 1.3 compliance translates to a smoother, more secure integration and a richer feature set for our customers. It removes barriers to adoption, meets security and IT requirements, and improves the user experience for both learners and instructors.
Our LTI implementation is LMS-agnostic and compliant with LTI 1.3. This means that
any LMS
supporting the integration for v1.3 is compliant to our implementation. The implementation is currenly covering
Deep Linking
,
Dynamic Registration
,
Assignment & Grade Service
, and
Names and Roles Provisioning
.
We’ve just launched the HTB Certified Junior Cybersecurity Associate (HTB CJCA) certification and Junior Cybersecurity Analyst job-role path — designed to equip complete beginners with hands-on training across core cybersecurity fundamentals and help them start confidently in the field.
With a hybrid curriculum covering both offensive and defensive skills, and professional-level reporting, HTB CJCA builds the foundation for junior professionals and practitioners to collaborate effectively from day one.
The course and certification is deal for:
  • Beginners approaching cybersecurity for the first time
  • Students and academic programs looking for real-world experience
  • Upskilling and reskilling IT staff
  • Onboarding new hires and analysts
The curriculum offers a comprehensive view on security basics and fundamentals, with Modules covering general, offensive, and defensive knowledge domains – all mapped to MITRE ATT&CK and NIST/NICE frameworks. Now available across all HTB business plans and Silver Annual subscription for individual learners, log in to your account and start exploring today.
Visual 2 - HTB CJCA Announcement Blo

new

Capture The Flag

Features

Enable MCP on your next CTF event

Today, we’re excited to announce support for a Model Context Protocol (MCP) Server in our CTF platform. This upgrade marks a new frontier in hands-on security learning: cybersecurity professionals (and aspiring ones) are augmented by AI tools and automation, and human expertise is amplified by intelligent systems.
In simpler terms, we’re bringing the latest AI capabilities directly into your playground, making advanced skills development more accessible and powerful than ever.
Think of MCP like a USB-C port for AI applications. You’re chatting with Claude to improve a sentence or get a recipe. Now imagine doing that and asking about the next Pillar event on the HTB CTF platform, or even solving challenges and writing a write-up, all in the same chat. That’s what MCP enables: seamless communication between AI tools and our CTF platform.
  • MCP Token Generation:
    Participants can now generate their own MCP token directly from their profile settings. This allows integration with tools like Claude or VS Code to interact with the CTF platform using AI. Tokens are one-time viewable and can be revoked at any time.
  • MCP Toggle:
    Admins can now control whether MCP is enabled per event. The toggle is located in the Event Settings and is disabled by default, giving full control over AI participation.
Beyond allowing players to use their preferred tools with our platform, MCP opens the door to even bigger opportunities. Customers are now able to connect their own AI models to train and compete with our content securely, all through MCP.
Two (2) new CTF packs have just dropped, designed to build hands-on expertise in blue teaming and crypto exploitation through real-world scenarios.
  • SOC Analyst Essentials – Essentials
Crafted for aspiring SOC analysts and individuals transitioning from IT roles, this pack features 12 beginner-friendly scenarios focused on defensive skills. Participants will analyze network captures, investigate malware infections, apply OSINT techniques, and solve SOC-related scripting tasks to build a strong blue team foundation.
  • Crypto Attacks on Web Applications – Enhanced
Tailored for red teamers, penetration testers, and application security engineers, this pack delivers 10 realistic scenarios highlighting cryptographic flaws in modern web apps. From weak JWT signing and RSA misuse to hash length extension attacks, participants will learn to identify and exploit crypto bugs with high-impact consequences.
Screenshot 2025-07-22 at 8
Six (6) new exclusive releases just dropped on Dedicated Labs, featuring CVE exploitation, AD delegation abuse, MITRE-based threat hunting, and unauthenticated RCE in modern web stacks.
  • Surcery | Exclusive Machine:
    Exploit CVE-2025-32463 by abusing the -R flag in sudo to load a malicious shared library via NSS and escalate privileges to root.
  • Oyako | Exclusive Machine:
    Chain Spring Boot RCE, Resource-Based Constrained Delegation, and AD Trust misconfigurations to escalate from child to parent domain controller.
  • VulnAir-1 | Exclusive Sherlock:
    Explore the TTPs of APT group LazyScripter through the MITRE ATT&CK framework to sharpen threat intel and hunting capabilities.
  • VulnAir-2 | Exclusive Sherlock:
    Investigate threat actor Chimera using MITRE-based analysis and real-world detection workflows for blue teams and SOCs.
  • LootLagoon | Exclusive Challenge:
    Exploit CVE-2024-56145 in Craft CMS via Twig template injection over FTP for unauthenticated RCE.
  • RansomNet | Exclusive Challenge:
    Abuse CVE-2025-48828 in vBulletin to gain RCE by bypassing access controls and injecting templates through the API.
Hiring skilled cybersecurity professionals is a notoriously difficult task. Traditional screening methods (like degree requirements or theoretical interviews) often fall short in evaluating a candidate’s true hands-on abilities in cyber defense or offense. Skill-based hiring has emerged as a solution – focusing on demonstrable competencies through practical assessments rather than just credentials.
Talent Search provides access to a massive talent pool of 3.6M+ cyber professionals looking for their next role. Source and hire candidates with validated skills directly from the community – quickly and easily.
Moving forward, all HTB customers will be able to purchase a Talent Search subscription directly from their subscription page. Choose between
Starter
,
Growth
, or
Ultimate
based on your hiring needs!
Screenshot 2025-07-21 at 4
With the rise of remote work, smart devices, and always-on connectivity, wireless networks remain a top attack vector.
The
Wi-Fi Password Cracking Techniques
course teaches you how to identify and exploit weaknesses in Wi-Fi networks using real-world techniques:
  • Perform dictionary, brute-force, and hybrid attacks
  • Use GPU acceleration and precomputed hash tables for speed and efficiency
  • Evaluate Wi-Fi password strength with industry-grade tools
  • Gain practical experience in assessing and hardening wireless security
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
Ready for your skills to do the talking at your next interview?
Head to HTB Academy and start learning today →
image
MacOS threats are rising, but DFIR skills for Apple systems are still high in demand.
In
GateKeeper
, you’ll investigate a targeted attack on a compromised Mac device. Your mission is to uncover evidence, analyze attacker behavior, and piece together what went wrong.
What you’ll learn how to:
  • Perform an in-depth forensic analysis on macOS
  • Identify persistence, lateral movement, and data manipulation techniques
  • Practice using real-world tools to investigate advanced threats
  • Sharpen your endpoint security response skills in a high-stakes scenario
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
Want to add new defensive skills to your utility kit
?
Login to HTB Labs today →
Weekly Content Drop Templates - 1200x675 (1)
Reporting on the HTB Enterprise Platform is now organized into three dedicated views — skills, time, and engagement — making it easier for cybersecurity managers to analyze performance, uncover trends, and make data-driven decisions.
Skills
Track progress and skill development across all content types:
  • Modules: Progress by NIST | NICE & MITRE ATT&CK
  • Machines: Spider charts and breakdown by knowledge domain
  • Sherlocks & Challenges: Skills attained by category
  • Professional Labs: MITRE ATT&CK coverage
Time
Understand how learning time is distributed:
  • Visual timelines
  • Activity grouped by content type
Engagement
Gain a clear picture of user activity:
  • Time spent across learning, practice, and enterprise-level scenarios
  • Identify the most and least active users
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
image

new

Capture The Flag

Features

Defensive

Threat Range: a new team-based defensive exercise

Threat Range is a new mode available on the HTB CTF platform designed to train security operations center (SOC) analysts and digital forensics (DFIR) investigators in realistic cyber defense scenarios – structured around a full attack-and-defend scenario divided into phases, with clear objectives for the blue team at each step: from attack execution to reporting.
This new simulation environment is built around the core tasks that a SOC team performs, emphasizing collaboration and prioritization skills. At the core of the experience is gamification, where players earn points and the
Threat Resilience Index
dynamically tracks the team's performance, showcasing the impact of the exercise on their overall capabilities.
Tailored specifically for professional cyber teams, targeting defensive job roles and organizations aiming to assess and improve their blue team skills through hands-on, realistic simulations – admins will also have access to essential business metrics such as
Mean Time to Respond
,
Mean Time to Detect
and
SLA Compliance
.
Threat Range is available from now for all HTB business customers with the same credit-based model of CTF events. Talk to our team to kickstart your first attack simulation (starting from 10,000 credits).
image (43)
Load More