Changelog
Follow up on the latest improvements and updates.
RSS
new
Academy
Enterprise
Defensive
Learn how attackers abuse core Windows mechanisms in new Academy module
The Privilege Escalation Tradecraft Analysis module covers the analytical study of privilege escalation tradecraft on Windows, from its role in the attack lifecycle to how it can be detected and investigated. While completing this module, you will analyze real-world techniques and exploits to understand how they work internally and learn how to translate this knowledge into effective and reliable detection strategies.
Key learning outcomes:
- Exploring where Windows privilege escalation fits within the attack lifecycle and how elevated access enables attacker objectives
- Breaking down Windows privilege escalation tradecraft by examining abuse of UAC, access tokens, services, kernel drivers, and COM infrastructure
- Recognizing and deconstructing real-world Windows privilege escalation techniques, including UAC bypasses, access token manipulation, and service account abuse
- Leveraging reverse engineering, debugging, and API call flow analysis to reveal how privilege escalation exploits function under the hood
- Connecting privilege escalation behavior to MITRE ATT&CK and converting technical insight into practical detection, investigation, and response strategies

new
Labs
Enterprise
Offensive
OWASP Top 10 2025 Track now available
The Hack The Box OWASP Top 10 2025 track introduces you to the most critical web application security risks facing modern applications.
Included in the track are 10 hands-on challenges ranging from Very Easy to Medium that have been aligned with the latest OWASP Top 10. By completing these challenges, you will learn how to identify and exploit common vulnerabilities, strengthening your ability to assess web applications in real-world environments.
Challenges include scenarios where you will uncover potential vulnerabilities, secure critical intelligence, infiltrate digital systems, analyze platform architecture, and more.

new
Capture The Flag
Offensive
Expose vulnerabilities in real-world AI systems with new CTF Pack
The
Offensive AI Security - Enhanced
pack is designed to provide essential training that prepares teams to identify vulnerabilities before adversaries exploit them in production environments.Each challenge in this pack represents a real vulnerability class from OWASP LLM Top 10, OWASP ML Top 10, and cutting-edge AI security research, requiring participants to exploit everything from access control systems and financial authorization to ML classifiers and federated learning networks.
The first seven challenges focus on practical LLM exploitation using prompt injection, agent manipulation, and MCP server attacks - techniques accessible to traditional penetration testers. The final four challenges introduce ML model attacks including adversarial examples, gradient leakage, federated learning backdoors, and LoRA artifact exploitation for those ready to advance.

new
Academy
Enterprise
Offensive
Introducing the HTB Certified Wi-Fi Pentesting Expert (CWPE)
HTB CWPE is a hands-on, cloud-based certification that brings wireless security training into the modern age. Paired with the WiFi Penetration Tester Job-Role Path, it's one of the few programs to offer a holistic curriculum, real-world practice with WPA3 attacks, and doesn’t require specific hardware or complex setups.
Included in the job-role path and certification are learning material and hands-on labs that focus on how attackers actually approach wireless environments: reconnaissance, exploiting weak configurations, credential attacks, evil twins, captive portals, and full corporate Wi-Fi attack chains for anyone who wants to properly understand and test wireless security, not just check a box.
Get started with HTB CWPE here or learn more on our blog here.

new
Enterprise
Offensive
Three new Professional Lab scenarios added to the HTB Enterprise Platform
Three new Professional Lab scenarios are now available on the HTB Enterprise Platform!
Shinra
is a medium-difficulty scenario that includes 14 machines and 12 flags focused on operating covertly without triggering detection mechanisms. The scenario demonstrates how covert techniques can bypass EDR, avoid SOC detection, and abuse trusted systems, highlighting the real business risk of advanced threats and why continuous testing, visibility, and resilience are critical to protecting core operations and critical infrastructure.
Reflection
is a hard-difficulty, time-efficient Active Directory scenario that includes 3 machines and 3 flags which simulate a vulnerable enterprise environment and challenges users to progress from limited access to Domain Administrator. This scenario demonstrates how a small, everyday security mistake can escalate into full control of an organization’s systems, putting users, data, and business operations at risk without the need for advanced attacks.
Trusted
is a hard-difficulty, time-efficient Active Directory scenario with 2 machines and 2 flags designed around an internal red team engagement on Trusted Inc. This scenario shows how a small, easily overlooked issue can grow into a complete enterprise takeover. 
new
Capture The Flag
Defensive
Practice modern threat intelligence with new CTF pack
The
OSINT APT Essentials
pack is designed to help SOC analysts, incident responders, and developers get comfortable with CTFs using pure OSINT before touching exploits or malware.This pack introduces 10 pure OSINT challenges built from real-world nation-state APT operations, using only public sources (MITRE ATT&CK, VirusTotal, ThreatFox, vendor reports). Throughout the 10 challenges in the pack, teams will expand analytical capabilities beyond daily alerts, giving Tier 1 and 2 analysts the exact skills needed to produce real attribution reports in addition to establishing the foundational OSINT workflow required by government agencies, MSSPs, and Fortune-500 CTI teams.

new
Academy
Enterprise
Offensive
Explore real-world Android vulnerabilities in new Academy module
The
Android Attacks
module provides a structured, hands-on introduction to the most common and impactful security risks affecting modern mobile applications. By completing the module, you will learn how mobile vulnerabilities arise, how to categorize them based on known mobile security frameworks, how they are exploited in real applications, and how to identify and remediate them using techniques learned in the previous modules.Key learning outcomes:
- Understanding the OWASP Mobile Top 10 and how modern mobile security risks span apps, APIs, networks, and cryptography
- Analyzing Android application architecture to identify key mobile attack surfaces and misconfigurations
- Identifying and exploiting Android vulnerabilities mapped to the OWASP Mobile Top 10, including auth, storage, communication, and cryptography flaws
- Applying analysis techniques to uncover insecure storage, weak crypto, exposed components, and reverse-engineering gaps
- Mapping mobile vulnerabilities to real attacker behaviors and applying practical remediation and hardening strategies

No flash, no story.
This Season is all about you
. We’d like to cast the light on one of the best underground security communities around! We have grown a group of extremely dedicated competitors and global initiates, looking to learn in a trial by fire. For those just joining, Seasons are what you’ve learned to the test:
- Attempt to solve Machines by testing out new techniques
- Use your existing offensive skills and rise on the leaderboard
- Earn Seasonal ranks, prizes, and achieve a new personal best
Whether you’re seeking glory or refining your skills, we will begin dropping our weekly Machines this weekend.
Is this your first Season? Check out our Seasonal blog for important updates + tips & tricks.
Tune in on the 31st for the first Machine.
The countdown has already begun. Head to HTB Labs now →

new
Capture The Flag
Defensive
New Threat Range Scenario - ClickRat
ClickRat simulates a real-world SOC investigation into an Active Directory workstation compromise orchestrated by an Initial Access Broker (IAB).
After being lured to a convincing but deceptive Web portal, an MIRAI HR staff member unknowingly sets off a silent compromise on their workstation. As the team responsible for safeguarding the organization, you must work together to uncover the hidden foothold the attacker has established, trace their quiet expansion of control, and prevent your environment from becoming a target for further exploitation.
This environment is composed of critical infrastructure components typically found in a corporate network and together with your team, you will collaborate to:
- Triage alerts
- Investigate suspicious activity
- Investigate forensic evidence
- Identify the impact to your organisation

new
Enterprise
Offensive
Defensive
New exclusive content available on Dedicated Labs
New exclusive content has been released on Dedicated Labs which feature an end-to-end compromise of a modern automation platform as well as observed activity by real ransomware groups in the wild.
Rusty | Exclusive Sherlock
This Sherlock is based on a real-life Ransomware and data exfiltration incident on a corporate network documented by the Triskele Lab DFIR Team, a Hack The Box partner. You will utilize several artifacts from two triage images and correlate the data to create a timeline and understanding of the whole incident.

BloodFlow | Exclusive Machine
A Very Easy Linux machine that demonstrates an exploit chain leading to unauthenticated RCE on a n8n workflow automation platform via two CVEs: CVE-2026-21858 (Ni8mare) and CVE-2025-68613.

Load More
→