Jun 10, 2022What is Bug Bounty Hunting?Lately Bug Bounty Hunting has become quite a buzzword. But what exactly is it and how can somebody start? Over time, applications became more complex. The more intricate a process is, the more things there are that can go wrong. In the era when most application code sizes lie in…Hack The Box7 min readHack The Box7 min read
Apr 8, 20224 Worst Myths about CybersecurityThese cybersecurity myths are popular... and dangerous! Let’s find out why. I’ve been in the cybersecurity industry and hacker culture for nearly fifteen years now. I once knew very little, now I know a little bit more, and I’m always learning. But my expertise grows, enhanced through my work and…Hackthebox4 min readHackthebox4 min read
Mar 25, 2022Five Dangerous Phishing ScamsWhen cyber attackers use websites and emails to pretend to be a person or company we trust, disaster occurs. Let’s learn from these five dangerous phishing scams! Phishing scams can be very destructive cyber attacks. Every use of computer technology to do deliberate harm is a cyber attack, and phishing…Information Technology5 min readInformation Technology5 min read
Mar 9, 2022Break the Bias: Celebrating Women in CybersecurityMarch is Women’s History Month and on March 8th, we celebrate International Women’s Day! This year’s theme is #BreakTheBias, with a focus on creating a world that is diverse, equitable, and inclusive. …Hack The Box6 min readHack The Box6 min read
Mar 8, 2022What is Network Security?Network security is a big topic and a large part of what you learn about with Hack The Box. If you’re a n00b, here’s your handy primer! Network security is a major component of cybersecurity. A large part of what you learn from Hack The Box’s Hacking Labs, Pro Labs…Networking5 min readNetworking5 min read
Mar 8, 2022What You Must Know About Malware RemovalMalware is bad. Getting rid of it is good. Here's what you must know. Many years before I started working for Hack The Box, I put in my time as a remote support technician. In the 2000s, I’d remove malware from about twenty or thirty Windows PCs per eight hour…Hack The Box6 min readHack The Box6 min read
Mar 7, 202210 Pentesting Tools Every Hacker NeedsIf you’re new to using software for pentesting, here are some tools you need to know about. The very best pentesting tools can be found in Pwnbox and Parrot OS. Pwnbox runs on Hack The Box’s infrastructure. You can also install Linux-based Parrot OS directly onto your PC. As you…Hack The Box10 min readHack The Box10 min read
Mar 6, 202210 OSINT Tools Hackers Need to Know AboutOpen source intelligence is a vital task for the red team and blue team alike. Here are some of the most useful OSINT tools. OSINT stands for “open source intelligence.” It’s all about finding information you can legally access, through legal means. OSINT is mainly done online, but it can be done offline as well. Pentesters use OSINT to research their targets, and threat intelligence specialists use OSINT to learn about cyber threats. OSINT…Osint7 min readOsint7 min read