Created by 21y4d
Many malicious actors tend to obfuscate their code to avoid it being detected by systems or understood by other developers.
You will learn the following topics:
- Intro to Code Obfuscation
- How to decode encoded messages
- Basic Code Analysis
- Sending basic HTTP requests
Our final exercise in this module will open a door for many other challenges and exercises in Hack The Box!
It is recommended to take the Web Requests module before this one to get a general understanding of how HTTP requests work. If you are already familiar with them, then you should be able to start this module.
- Source Code
- Code Obfuscation
- Basic Obfuscation
- Advanced Obfuscation
- Code Analysis
- HTTP Requests
- Skills Assessment
This module progresses you towards the following Paths
Easy 43 Sections
Cubes Required: 30
To be successful in any technical information security role, we must have a broad understanding of specialized tools, tactics, and terminology. This path introduces core concepts necessary for anyone interested in a hands-on technical infosec role. The modules also provide the essential prerequisite knowledge for joining the main Hack The Box platform, progressing through Starting Point through easy-rated retired machines, and solving "live" machines with no walkthrough. It also includes helpful information about staying organized, navigating the HTB platforms, common pitfalls, and selecting a penetration testing distribution. Students will complete their first box during this path with a guided walkthrough and be challenged to complete a box on their own by applying the knowledge learned in the Getting Started module.
Fundamental 9 Sections
Easy 11 Sections
Fundamental 23 Sections
This module covers the fundamentals of penetration testing and an introduction to Hack The Box.