Coding in Cybersecurity: Beyond the Tools and Scanners | HackTheBox Coding Challenges
In this video, I’ll show you how to solve real coding challenges from HackTheBox using Python. If you're a cybersecurity enthusiast who wants to go beyond tools and GUIs, this one’s for you. This video focuses on coding-driven CTFs, especially those that require careful parsing, algorithmic logic, or exploit proof-of-concepts. The challenges I solve in this post are retired challenges and are listed below:
HackTheBox Threat Index
HackTheBox Oddly Even
HackTheBox Reversal
HackTheBox Addition
HackTheBox Triple Knock
HackTheBox MiniMax
HackTheBox Honeypot
HackTheBox BlackWire
HackTheBox Insane Bolt
HackTheBox Ghost Path
****
Receive Cyber Security Field, Certifications Notes and Special Training Videos
https://buymeacoffee.com/notescatalog/membership
Writeup
https://motasem-notes.net/practical-coding-in-cyber-security-hackthebox-coding-challenges/#HackTheBox_Triple_Knock_Description
******
Store
https://buymeacoffee.com/notescatalog/extras
Patreon
https://www.patreon.com/motasemhamdan
Instagram
https://www.instagram.com/motasem.hamdan.official/
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/
TikTok
https://www.tiktok.com/@motasemhamdan0
***
0:00 - Why Coding Matters in Cybersecurity
1:01 - Practical Use Case: Hack The Box Coding Challenges
1:53 - Overview of Threat Index Challenge
2:59 - Threat Score Formula Explained
4:09 - Input Example and Expected Output
5:03 - Building the Keyword-Weight Dictionary
6:02 - Looping Through Keywords to Calculate Score
8:22 - Running the Code and Getting the Flag
8:42 - Intro to Triple Log Challenge
9:33 - Detecting Brute Force Login Attempts
10:17 - Reading Log Entries and Users
11:10 - Storing Failed Login Timestamps
12:25 - Converting Timestamps into Minutes
13:04 - Sliding Window Logic for Detection
13:40 - Outputting the Flagged Users
14:16 - Final Thoughts and Goodbye
Видео Coding in Cybersecurity: Beyond the Tools and Scanners | HackTheBox Coding Challenges канала Motasem Hamdan
HackTheBox Threat Index
HackTheBox Oddly Even
HackTheBox Reversal
HackTheBox Addition
HackTheBox Triple Knock
HackTheBox MiniMax
HackTheBox Honeypot
HackTheBox BlackWire
HackTheBox Insane Bolt
HackTheBox Ghost Path
****
Receive Cyber Security Field, Certifications Notes and Special Training Videos
https://buymeacoffee.com/notescatalog/membership
Writeup
https://motasem-notes.net/practical-coding-in-cyber-security-hackthebox-coding-challenges/#HackTheBox_Triple_Knock_Description
******
Store
https://buymeacoffee.com/notescatalog/extras
Patreon
https://www.patreon.com/motasemhamdan
https://www.instagram.com/motasem.hamdan.official/
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
https://twitter.com/ManMotasem
https://www.facebook.com/motasemhamdantty/
TikTok
https://www.tiktok.com/@motasemhamdan0
***
0:00 - Why Coding Matters in Cybersecurity
1:01 - Practical Use Case: Hack The Box Coding Challenges
1:53 - Overview of Threat Index Challenge
2:59 - Threat Score Formula Explained
4:09 - Input Example and Expected Output
5:03 - Building the Keyword-Weight Dictionary
6:02 - Looping Through Keywords to Calculate Score
8:22 - Running the Code and Getting the Flag
8:42 - Intro to Triple Log Challenge
9:33 - Detecting Brute Force Login Attempts
10:17 - Reading Log Entries and Users
11:10 - Storing Failed Login Timestamps
12:25 - Converting Timestamps into Minutes
13:04 - Sliding Window Logic for Detection
13:40 - Outputting the Flagged Users
14:16 - Final Thoughts and Goodbye
Видео Coding in Cybersecurity: Beyond the Tools and Scanners | HackTheBox Coding Challenges канала Motasem Hamdan
Комментарии отсутствуют
Информация о видео
23 июня 2025 г. 21:52:40
00:14:20
Другие видео канала