ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Coding in Cybersecurity: Beyond the Tools and Scanners | HackTheBox Coding Challenges

cybersecurity

information technology

tech

education

books

information security

ethical hacking

Автор: Motasem Hamdan

Загружено: 2025-06-23

Просмотров: 677

Описание: In this video, I’ll show you how to solve real coding challenges from HackTheBox using Python. If you're a cybersecurity enthusiast who wants to go beyond tools and GUIs, this one’s for you. This video focuses on coding-driven CTFs, especially those that require careful parsing, algorithmic logic, or exploit proof-of-concepts. The challenges I solve in this post are retired challenges and are listed below:
HackTheBox Threat Index
HackTheBox Oddly Even
HackTheBox Reversal
HackTheBox Addition
HackTheBox Triple Knock
HackTheBox MiniMax
HackTheBox Honeypot
HackTheBox BlackWire
HackTheBox Insane Bolt
HackTheBox Ghost Path
****
Receive Cyber Security Field, Certifications Notes and Special Training Videos
https://buymeacoffee.com/notescatalog...
Writeup
https://motasem-notes.net/practical-c...
******
Store
https://buymeacoffee.com/notescatalog...
Patreon
  / motasemhamdan  
Instagram
  / motasem.hamdan.official  
LinkedIn
[1]:   / motasem-hamdan-7673289b  
[2]:   / motasem-eldad-ha-bb42481b2  
Twitter
  / manmotasem  
Facebook
  / motasemhamdantty  
TikTok
  / motasemhamdan0  
***
0:00 - Why Coding Matters in Cybersecurity
1:01 - Practical Use Case: Hack The Box Coding Challenges
1:53 - Overview of Threat Index Challenge
2:59 - Threat Score Formula Explained
4:09 - Input Example and Expected Output
5:03 - Building the Keyword-Weight Dictionary
6:02 - Looping Through Keywords to Calculate Score
8:22 - Running the Code and Getting the Flag
8:42 - Intro to Triple Log Challenge
9:33 - Detecting Brute Force Login Attempts
10:17 - Reading Log Entries and Users
11:10 - Storing Failed Login Timestamps
12:25 - Converting Timestamps into Minutes
13:04 - Sliding Window Logic for Detection
13:40 - Outputting the Flagged Users
14:16 - Final Thoughts and Goodbye

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Coding in Cybersecurity: Beyond the Tools and Scanners | HackTheBox Coding Challenges

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

How SOCs Protect You From Hackers 24/7 | TryHackMe SOC Fundamentals

How SOCs Protect You From Hackers 24/7 | TryHackMe SOC Fundamentals

The Most Advanced Ransomware Just Dropped And It’s Terrifying | The Return of LockBit Ransomware

The Most Advanced Ransomware Just Dropped And It’s Terrifying | The Return of LockBit Ransomware

How Hackers Use SQLmap to Hack Databases | TryHackMe SQLmap Basics

How Hackers Use SQLmap to Hack Databases | TryHackMe SQLmap Basics

How I got Hacked on everything and why you should never use google password manager

How I got Hacked on everything and why you should never use google password manager

HTB Starting Point walkthrough - Crocodile

HTB Starting Point walkthrough - Crocodile

How Hackers Hack Online Resume Builders

How Hackers Hack Online Resume Builders

they tried to hack me so i confronted them

they tried to hack me so i confronted them

Linux Touch Command Explained (Complete Flags + Timestamp Guide)

Linux Touch Command Explained (Complete Flags + Timestamp Guide)

Every Level Of Hacking Explained in 8 Minutes

Every Level Of Hacking Explained in 8 Minutes

КОГДА ИСЧЕЗНЕТ УКРАИНА? | #ВзглядПанченко

КОГДА ИСЧЕЗНЕТ УКРАИНА? | #ВзглядПанченко

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]