Web Service & API Attacks

Introduction to Web Services and APIs According to the World Wide Web Consortium (W3C), web services provide a standardized way for different software systems—running on diverse platforms and built with different technologies—to communicate and share data. They are designed to be highly interoperable and flexible, using XML to describe their structure in a format that … Ler mais

Broken Authentication

What is Authentication? According to RFC 4949, authentication is “the act of verifying a claim that a system entity or resource has a particular attribute value.” In the field of information security, authentication refers to confirming the identity of an entity—making sure that someone or something is truly who or what it claims to be. … Ler mais

Introduction to Penetration Testing

Penetration Testing (Pentesting): Hacking with Permission Penetration testing, often called ethical hacking, is the art of legally simulating cyberattacks to uncover weaknesses in a company’s digital defenses.Instead of waiting for real hackers to strike, penetration testers act first — using the same tools and tactics as attackers to find flaws, test defenses, and help organizations … Ler mais

Server-Side Attacks

Server-side attacks concentrate on weaknesses in the application or services that run on a server, while client-side attacks occur on the user’s device (the browser or client machine) rather than on the server. Recognizing and distinguishing between these two categories is critical for effective penetration testing and bug-bounty work, because the attack surface, exploitation techniques, … Ler mais

Setting Up

🎯 Introduction Before starting any penetration-testing engagement, it’s crucial to build a dependable, efficient workspace. That means organizing your tools, configuring systems, and preparing all required resources in advance. A well-planned testing environment reduces downtime, cuts mistakes, and speeds up the assessment. This module covers the core technologies and configurations you should establish up front, … Ler mais

Web Attacks

Introduction to Web Attacks As web applications become ubiquitous across businesses, defending them against malicious activity grows increasingly important. Modern web apps are more feature-rich and interconnected than ever, and attackers have evolved accordingly. That expanded functionality increases the overall attack surface for organizations, which is why web-based attacks are among the most frequent threats … Ler mais

Command Injections

Intro to Command Injection Vulnerabilities A Command Injection vulnerability ranks among the most dangerous security flaws a web application can have. It enables an attacker to run arbitrary operating-system commands on the server that hosts the application, potentially giving them control over that server and a path into the wider network. When a web app … Ler mais

Network Foundations

Introduction to Networks Welcome to Network Foundations!In this introductory module, we’ll take a deeper look into the fascinating technology that powers computer networking—commonly referred to simply as networking or networks—and understand why it has become an inseparable part of our modern world. Throughout this section, we will focus primarily on two of the most common … Ler mais

Bug Bounty Hunting Process

Bug Bounty Programs As highlighted in the summary of this module, a bug bounty program is generally viewed as a crowdsourcing initiative where individuals are rewarded—both with recognition and financial incentives—for finding and responsibly reporting software vulnerabilities. However, these programs go beyond simple rewards. A bug bounty program (often referred to as a Vulnerability Rewards … Ler mais

Hacking WordPress

Introduction WordPress Overview WordPress is the world’s most widely used open-source Content Management System (CMS), powering nearly a third of all websites globally. It serves a variety of purposes, from personal blogs and discussion forums to e-commerce platforms, project tracking tools, and document management systems. One of the main reasons for its popularity is its … Ler mais

Introduction to Bash Scripting

Bourne Again Shell (Bash) Bash is the shell and scripting language we use to interact with Unix-like systems and issue commands to the operating system. Since May 2019, Windows ships the Windows Subsystem for Linux (WSL), which lets you run Bash on Windows. Learning Bash is essential for working quickly and effectively—unlike compiled programming languages, … Ler mais

Intro to Academy

Introduction Hack The Box Academy is designed to make cybersecurity learning both engaging and efficient. Its mission is to deliver a dynamic, interactive experience where learners can enjoy the process while developing new skills. The platform follows a guided learning approach, ensuring that users can immediately apply their knowledge through hands-on practice. Throughout the modules, … Ler mais