Notes on Hack the Box

Notes on Hack the Box

Hack the Box is an online platform allowing to you test your penetration testing skills.

The first challenge you face is to find your way in, hacking the invite code in order to become a member.

We had a joyful experience doing it. In this article we share some useful tools we found useful. You might or might not need them. Anyway, we hope you find this game constructive.

Let's start off by opening the Sign Up page:

Source code (HTML, Java script, CSS, etc.) can be viewed by using Chrome Developer Tools as shown below.

CodeBeautify HTML can be used in order to format HTML source code:

JSBeautifier can be used in order to get a human-readable version of the Java Script source code:

Chrome Developer Tools can be used to interactively execute Java Script functions as follows:

You might also find useful Base64Decode in order to encode into Base64 format and decode Base64 into plain text.

Another tool is Postman for Chrome, which you can use to make GET and POST requests:

There is plenty of vulnerable machines waiting for you once you have created your account:

Try it, share your experience and provide feedback!

HTB is a great system I've learned so much and I recommend them to everyone I can.

回复

要查看或添加评论,请登录

?? Fernando Bucci的更多文章

  • Pensando en colores

    Pensando en colores

    En este artículo te contaré cómo, aún hoy, nos seguimos perdiendo en los más básicos razonamientos, cuáles son algunos…

    1 条评论
  • Sustainable IT (I)

    Sustainable IT (I)

    This is the first of a series of articles whose goal is to provide an introduction to the concept of Sustainable IT…

  • API Design Patterns

    API Design Patterns

    APIs bring significant benefits when used in different scenarios. In this article, the most relevant kinds of scenarios…

  • Why strategy gurus have lied to us for decades and the truthful truth

    Why strategy gurus have lied to us for decades and the truthful truth

    You must have already pitched upon several strategy experts and gurus explaining with pride the process for defining…

    3 条评论
  • What if Histiaeus used WhatsApp?

    What if Histiaeus used WhatsApp?

    Steganography is the practice of concealing the fact that a secret message is being sent as well as the contents of the…

  • Machine Learning - Supervised Learning - Classification (I)

    Machine Learning - Supervised Learning - Classification (I)

    In this article we will use classification algorithms to predict the species flowers belongs to by knowing petal and…

  • Machine Learning - Some basic definitions

    Machine Learning - Some basic definitions

    Machine learning is a branch in computer science that studies the design and use of algorithms and models that can…

  • Machine Learning - Data visualization with R (III)

    Machine Learning - Data visualization with R (III)

    This article continues presenting different techniques that can be used to communicate data or information by encoding…

  • Machine Learning - Data visualization with R (II)

    Machine Learning - Data visualization with R (II)

    This article continues presenting different techniques that can be used to communicate data or information by encoding…

  • Machine Learning - Data visualization with R (I)

    Machine Learning - Data visualization with R (I)

    This article presents different techniques that can be used to communicate data or information by encoding it in…

社区洞察

其他会员也浏览了