<img src="https://certify.alexametrics.com/atrk.gif?account=kla4t1zDGU20kU" style="display:none" height="1" width="1" alt="">
Contact us
Request demo →
Contact us

7 Tips: how to win a prize at Hâck THe Hague

by Cybersprint Blog 27 Jan 2021

Serial winners Rik van Duijn and Wesley Neelen don’t spend much time preparing for Hâck the Hague and partly attribute their successes to luck. Although the chance of getting lucky is not transferable, the serial winners do want to share several tips to increase your chances of success. These tips include things such as undivided focus, working in a structured manner and documenting your activities. It's all aimed at enabling you to do as much as possible in the shortest period of time.

Watch Podcast

Are you participating in HTH on your own, these tips might help:

  1. Make sure you come with a laptop that is fully up to date, including latest versions of all the tools you might need and make sure you have everything at your fingertips.
  2. Especially in large settings like HTH, it’s imperative that you maintain an overview of the entire playing field at all times and don’t dive into the details too soon. Avoid being the victim of tunnel vision at all costs. This requires some level of self-discipline but eventually will pay out in better hacks.
  3. Properly document what you do to prevent wasting time on searching information that you know you've encountered before, especially later on in the process. For example, tools like Burp Suite help to automatically create an overview of all websites that you have visited during your investigations.
  4. Spend enough time on finding real hacks. Focus on one thing at a time instead of constantly fluttering from one thing to another. It can be hard to be patient and stay with the same thing for a while, but that considerably increases your chances of finding vulnerabilities that really stand out.

    If you are attending HTH as part of a team (max. two people), pay attention to the following:
  5. Make sure you smartly distribute activities and focus between yourselves. By dividing tasks you also prevent working on similar things without knowing (remember: ‘great minds think alike”😉)
  6. Don’t forget to actively use one another as sparring partner – Two heads are better than one!
  7. Document what you do and come across in one single document. Apart from the advantage mentioned earlier, that it will help you find information quicker, there’s another thing. What might be an unimportant detail for you, can be a good starting point or clue for your partner.

Want to refresh your skills? Visit www.certifiedsecure.com to run through relevant levels. Another place where you can find plenty of training materials to help you prepare is Hack the Box Academy.

And last but not least: enthusiasm and simply having fun in hacking is the most important ingredient for success!
Watch Podcast

Digital Footprint compared to 5 security technologies

In this blog, we'll cover our Digital Footprint approach compared to five existing security approaches. What methods do they share? And where do they complement each other? We'll have a look at these techniques:  1. Asset discovery 2. Vulnerability management 3. Penetration testing 4. Red teaming 5. Supplier security governance Each has some touch points with Digital Footprint. For this comparison, we build on our earlier explanations of the concept. In the first blog, we gave our definition and summarised what drives the need for the solution. You can read our second blog to see how Digital Footprint is positioned with regards to External Threat Intelligence.

read more

Digital Footprint in External Threat Intelligence

Every IT Security team needs access to some sort of Threat Intelligence (TI). It is an umbrella term for the collection of information and data on security risks and the threat actors behind them. Together, this information helps to prevent or limit incoming threats, and provides insights when mitigating an incident or event in Incident Response scenarios. As a deepening of the topic, External Threat Intelligence (ETI) mainly focusses on the combination of internal risk data with threat intelligence originating from outside of the organisation.

read more

CEO insights: 3 trends for 2021's cybersecurity

The year 2020 has brought us many different events and experiences, all with varying levels of impact. Physical events have impacted the digital world, and cybersecurity incidents have had their effect on the way we live. Remember the Citrix incident early this year? That prohibited many from working remotely, resulting in massive rush hours traffic jams as everyone travelled to the office. Almost the exact opposite of what COVID-19 has done to our way of working. But what does this mean for 2021's cybersecurity? And what evolving threats should you prepare for? Three cybersecurity CEOs share their views, predictions, and tips. 

read more

Do you have a question?

Our experts have the answers

Contact us