Hack the Box use case

Hack the box has been my latest learning platform after Tryhackme, Root Me and PortSwigger Academy.

It can be divided in two main categories :

Learning Security

Hack the Box Academy can be compared to Tryhackme’s learning path while being less guided and requiring more prior knowledge. It’s worth mentioning that Tryhackme’s content quality tends to be more disparate. In this regard, I’d recommend anyone interested in IT to search for the core concepts tied to their specialty by looking up at roadmap.sh and THEN getting your hands on Hack The Box rather than TryHackMe.

TryHackMe mention

I started learning offensive security through it. My opinion towards it is biased, since I didn’t know how to properly learn and retain information. I spent multiple months working through modules without having a deep understanding of what I was doing, only by following step by step explanation. Before diving in any of these platforms, I highly recommend anyone reading through Learning Process.

Regarding Web content


Hack The Box Academy Bug Bounty Hunter (or soon to be Certified Web Exploitation Specialist) seems to have great resources (Actively going through the content). However websecurity academy is remains free and very complete.

Get the most out of it


Hack the Box really shines when combining learning content and practicing by compromising machines, though it can get expensive depending on your profile*.

If you can afford both, consider learning as much as you can on academy until you can’t absorb more information and then take a break by practicing on retired machine. Keep writing-up your work and linking it to the learning material you just consumed.

Otherwise, focusing on learning through a complete job role path is tedious but will allow to surf through easy to medium machines once you’re finished.

Pricing change*

INFO

The financial question is particularly valid now that Hack The Box announced its intent to fuse VIP and VIP+ to a more expensive subscription on Hack The Box labs. The monthly Lab subscription is now ~16€.

Certifications

Here’s a touchy topic. I’m looking forward to acquire CWES (previously called CBBH), CPTS and eventually CWEE later. To be honest, I intend to pass these for my personal enjoyment, learning progress and market value. As such, I already started working on both first courses and taking notes, which I intend to publish progressively.

Being able to assess the exam requires to validate the Job Role Path tied to the certification. A Job Role Path is split into modules, each of them separated into topics. Some of the modules are common to both CBBH and CPTS so there will be redundancy in the notes listing below :

CPTS


ModuleStatusPublication
Penetration Testing Process

Completed

Published
Getting started

Completed

Published
Network Enumeration with Nmap

Completed

Published
Footprinting

Completed

Unpublished
Information Gathering - Web Edition

Completed

Unpublished
vulnerability assessment

Completed

Unpublished
File Transfers

Completed

Unpublished
Shells & Payloads

Completed

Unpublished
Using the Metasploit Framework

Completed

Unpublished
Password Attacks

In Progress

Unpublished
Attacking Common Services

Uncompleted

Unpublished
Pivoting, Tunneling, and Port Forwarding

Uncompleted

Unpublished
Active Directory Enumeration & Attacks

Uncompleted

Unpublished
Using Web Proxies

Completed

Published
Attacking Web Applications with Ffuf

Uncompleted

Unpublished
Login Brute Forcing

Uncompleted

Unpublished
SQL Injection Fundamentals

Completed

Published
SQLMap Essentials

Completed

Published
Cross-Site Scripting (XSS)

Completed

Published
File Inclusion

Uncompleted

Unpublished
File Upload Attacks

Uncompleted

Unpublished
Command Injections

Completed

Published
Web Attacks

Uncompleted

Unpublished
Attacking Common Applications

Uncompleted

Unpublished
Linux Privilege Escalation

Uncompleted

Unpublished
Windows Privilege Escalation

Uncompleted

Unpublished
Documentation & Reporting

Uncompleted

Unpublished
Attacking Entreprise Networks

Uncompleted

Unpublished

CWES


ModuleStatusPublication
Web Requests

Completed

Published
Introduction to Web Applications

Completed

Published
Using Web Proxies

Completed

Published
Information Gathering - Web Edition

Completed

Unpublished
Web Fuzzing

Completed

Published
JavaScript Deobfuscation

Completed

Published
Cross-Site Scripting (XSS)

Completed

Published
SQL Injection Fundamentals

Completed

Published
SQLMap Essentials

Completed

Published
Command Injections

Completed

Published
File Upload Attacks

Uncompleted

Unpublished
Server-side Attacks

Uncompleted

Unpublished
Login Brute Forcing

Uncompleted

Unpublished
Broken Authentication

Uncompleted

Unpublished
Web Attacks

Uncompleted

Unpublished
File Inclusion

Uncompleted

Unpublished
Attacking GraphQL

Uncompleted

Unpublished
API Attacks

Uncompleted

Unpublished
Attacking Common Applications

Uncompleted

Unpublished
Bug Bounty Hunting Process

Uncompleted

Unpublished

CWEE


Let's finish both the above first

Machine Write-ups

Currently not a priority

Most of the recent write-ups were done on active machines, I’ll try to keep an eye on the retirements and publish it soon after. In the meantime, I’d recommend checking https://0xdf.gitlab.io/ for quality write-ups.

Write-ups were not made with publishing in mind, transferring a whole write-up to this specific vault is taking me longer than simply copy pasting.

Linux


Windows


NOTE

Windows labs are not my specialty, ask Wuentin to publish some.