Coding in Cybersecurity: Beyond the Tools and Scanners | HackTheBox Coding Challenges
Автор: Motasem Hamdan
Загружено: 2025-06-23
Просмотров: 677
Описание:
In this video, I’ll show you how to solve real coding challenges from HackTheBox using Python. If you're a cybersecurity enthusiast who wants to go beyond tools and GUIs, this one’s for you. This video focuses on coding-driven CTFs, especially those that require careful parsing, algorithmic logic, or exploit proof-of-concepts. The challenges I solve in this post are retired challenges and are listed below:
HackTheBox Threat Index
HackTheBox Oddly Even
HackTheBox Reversal
HackTheBox Addition
HackTheBox Triple Knock
HackTheBox MiniMax
HackTheBox Honeypot
HackTheBox BlackWire
HackTheBox Insane Bolt
HackTheBox Ghost Path
****
Receive Cyber Security Field, Certifications Notes and Special Training Videos
https://buymeacoffee.com/notescatalog...
Writeup
https://motasem-notes.net/practical-c...
******
Store
https://buymeacoffee.com/notescatalog...
Patreon
/ motasemhamdan
Instagram
/ motasem.hamdan.official
LinkedIn
[1]: / motasem-hamdan-7673289b
[2]: / motasem-eldad-ha-bb42481b2
Twitter
/ manmotasem
Facebook
/ motasemhamdantty
TikTok
/ motasemhamdan0
***
0:00 - Why Coding Matters in Cybersecurity
1:01 - Practical Use Case: Hack The Box Coding Challenges
1:53 - Overview of Threat Index Challenge
2:59 - Threat Score Formula Explained
4:09 - Input Example and Expected Output
5:03 - Building the Keyword-Weight Dictionary
6:02 - Looping Through Keywords to Calculate Score
8:22 - Running the Code and Getting the Flag
8:42 - Intro to Triple Log Challenge
9:33 - Detecting Brute Force Login Attempts
10:17 - Reading Log Entries and Users
11:10 - Storing Failed Login Timestamps
12:25 - Converting Timestamps into Minutes
13:04 - Sliding Window Logic for Detection
13:40 - Outputting the Flagged Users
14:16 - Final Thoughts and Goodbye
Повторяем попытку...

Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: