Welcome to HBH V2 ! If you had an account on hellboundhacker.org you will need to reset your password using the Lost Password system before you will be able to login.


HBH is a non-profit community designed to inform and teach web developers, system administrators and everyone else in between the various methods and tactics used by malicious hackers to access systems and sensitive information. With our hand-on style you will learn the methods and the steps you need to take to protect yourself, from our forum, articles and our simulated security challenges. Learn how hackers break in, and how to keep them out.

: : HBH Blog : :

HBH Development Update

We are currently putting the finish touches to the next version of HBH 2.0.16 which is a small update to the site. However, we are also working on HBH version 3.0.0 which will be a huge update to HBH and all our challenges. We will post more information about HBH version 3.0.0 closer to the time of release, however we can say here that no point will be reset!

Welcome to HBH V2

This is a just a short post to welcome you all to the new version and to let you know that we are aware of an issue with the challenges where Lorem Ipsum text is being displayed instead of the correct content for the challenges and hints. Were currently working on resolving the issue and should have it resolved shortly.

HBH V2 Update

I'm pleased to announce that the new version of HBH will be going live at the end of August, with maintenance taking place this weekend (14th August) in preparation for the new version the follow week. The new version of HBH is a full rebuild of HBH with very few new features as the main focus for this new version is a solid base system for us and to keeping as much of the old database content as possible. This has limited features and changes that we wanted to make however once the new version is live, we can move quickly and upgrade or replace big parts of the database letting us add features and clean up some of the hacks which are in place currently.

A few HBH Updates

We have pushed some fixes out to some of the broken challenges. Real7 is now back online! Please check the status page before asking if a challenge is down. We will have some big news about HBH coming soon, If you want to help out with beta testing this big news please let rex_mundi know so we can add you to the list. Any EM members are already on the list :) If you have questions about this big news feel free to post them in the following thread. ~ Mordak

Forward Secrecy & Strict Transport Security

Today we implemented Forward Secrecy in order to improve the security and privacy of HBH. Forward Secrecy "should" make it "impossible" to eavesdrop on data being transmitted from your browser to HBH's servers. We also have Strict Transport Security enabled. You can check the report on our SSL here. The SSL report is provided by Qualys SSL Labs Also we have updated PHP so a few page may be offline, if you find any please report them here. We have also updated the Development page so you can all see what we are working on and things we would like to do. Feel free to post your thoughts on the current projects. Also we have updated the Change Log to reflect these changes. Points for Creating Challenges & Points for Hall of Fame entries have been returned to the accounts that lost them.

Ranking System Changes

Since the points reset, We have had a lot of complaints about administrators being in the top ten on the rankings page. The current Admin staff have been here for a while and had already completed the challenges BUT to keep everyone happy, Administrators will no longer be included in the points rankings and will be unranked in their profiles. On another note Real 15 IS up and running fine. UPDATE: Real 9 an 10 are also now back up. korg

Changes to HBH

All Members Read This! There has been a few changes to HBH over the past few weeks. Here are a list of changes and some reason why: We have removed the old database tables and reset the points. This is due to old and corrupted accounts and no way for other members to get on the score board, Points cannot and will not be reinstated. We have also removed user accounts that haven\'t logged in in over a year. We have two new staff members Euforia33 & rex_mundi they have been a great help to HBH over the years! We also have improved the forum and replaced some old code which should make things faster. Thanks HBH Staff

PHP Upgrade and New Challenges

Due to the recent upgrade in the PHP on the server, Some pages may not display properly and a few challenges will be offline. Basic 26, Real 7, 9 Will be Offline till I get them recoded. Realistic 17 is back up and running. On the other hand, The Application page is completely redone to make it easier to submit your answers. I\'m going to upload a few new challenges to keep everyone occupied while I work on the site. Any bugs you see please submit them, Any Vulnerabilities Pm me them directly. UPDATE: Application 17 by 4rm4g3dd0n released today. UPDATED UPDATE: Stegano 25, 26 and 27 by Euforia33 released also! UPDATED UPDATE UPDATE: Mordak has bought HBH a proper SSL Cert. UPDATED UPDATED UPDATE UPDATE: HBH Change log is now active. korg

New Challenge Released Today

New Stegano challenge released today! Stegano 24 by shadowls. This is a tough one, Took a while to figure it. So have fun. More on the way. Also bugs fixed in Javascript 5, Real 5 and Tracking 2. Update: Pentest Challenges are back online. Real 7 & 9 are down till further notice Along with Real 17. All other challenges are fixed. If you have any problems submit them as a bug. Exclusive Membership is working again. korg

Bug Updates

Pm And Forum System Fixed For New Members PM system should be working fine now for all new members. If anybody is having problems you can still PM me WITH your username and I\'ll check it out. Forum is also now fixed. Again anyone having problems let me know. New challenges coming soon. korg SSL has now been fixed. ~ Mordak

: : Tech News : :

npm security update: Attack campaign using stolen OAuth tokens

On April 15, we published a blog detailing an attack campaign utilizing stolen OAuth user tokens issued to two third-party GitHub.com integrators, Heroku and Travis CI. The npm organization on GitHub.com was impacted by this campaign and we have been actively investigating the impact of this attack on npm since April 12. Today, we are sharing details of what we’ve learned during our investigation and an additional, though unrelated, finding impacting npm. Below is a brief summary; read on to learn more.

Broadcom to Acquire VMware for $61 Billion

Broadcom has signaled its $61 billion acquisition of VMware will involve a “rapid transition from perpetual licenses to subscriptions.” That's according to Tom Krause, president of the Broadcom Software Group, on Thursday's Broadcom earnings call. He was asked how the semiconductor giant plans to deliver on its guidance that VMware will add approximately $8.5 billion of pro forma EBITDA to Broadcom within three years of the deal closing – significant growth given VMware currently produces about $4.7 billion. And subscriptions was the answer.

He gave us the GIF: Stephen Wilhite dead at 74

It’s pronounced “JIF”, by the way

Suspected Lapsus$ hackers arrested.

The City of London Police has arrested seven teenagers that are suspected to be involved in the Lapsus$ hacking group. A 16-year-old from Oxford, UK, has also been named by rival hackers and researchers as one of the groups leaders but the police did not say whether he was included in the group that was arrested.

New Skills Academy Suffers Data Breach

Subscribed users on the New Skills Academy Online Learning Platform have been informed by the company of a data breach. In accordance with their notification of this incident, the exact number of users who were affected by the occurrence is still unknown. The British corporation, situated in Hertford, England, is one of the worlds most popular online learning platforms. The organization offers 800 courses to 800,000 registered users. The courses include a wide range of topics, including personal development, health and safety, professional growth, technology, business, and a variety of other subjects.

LinkedIn hacked again.

Personal info of 756 million users leaked. Popular business social network LinkedIn has suffered its second massive data leak of the year, with over 90% of its users affected. Back in February, it was reported that 500 million LinkedIn users had their data leaked by hackers online. The initial leak was part of a massive breach that covered several platforms, including Netflix. The latest leaks exposed the data of 756 million LinkedIn users and compromised the security of their accounts. The hackers are now selling the data, including phone numbers, personal information, email addresses, company details, names, and possibly more info yet to be revealed.

Google Cloud VMs vulnerable to hijack

An attacker could gain root access to VMs running on Google Cloud Cybersecurity researcher Imre Rad has disclosed a potential vulnerability that can be exploited to get root access to virtual machines (VM) running on Google Cloud. Specifically, the attack exploits a weakness in Google Compute Engine (GCE), which is Google Clouds Infrastructure-as-a-Service (IaaS) product. Rad explains that attackers can take over GCE VMs by taking advantage of a weakness in the random number generator of the ISC DHCP server they use by default, together with an unfortunate combination of additional factors. The hijacking is done by impersonating the metadata server from the targeted virtual machines point of view. By mounting this exploit, the attacker can grant access to themselves over SSH (public key authentication) so then they can login as the root user.

Pavel Sitnikov arrested for sharing malware source code

Russian authorities have detained earlier this month a popular figure on the Russian hacking scene on charges of distributing malicious software via his Telegram channel. Pavel Sitnikov, known primarily for operating the now-suspended @Flatl1ne Twitter account and the Freedom F0x Telegram channel, was raided by law enforcement officials on May 20 at his home in the town of Velikiye Luki, in the Pskov region in Eastern Russia. He was charged the next day under Article 273, Part 2 of Russian criminal law, and forbidden to leave the town or use any electronic devices until his trial. Sources close to Sitnikov have told Recorded Future analysts that the Russian hacker was allegedly charged for posting the source code of the Anubis banking trojan on Freedom F0x, a Telegram channel where Sitnikov often posted data leaks and malware source code under the pretense of helping the security community. But in a video interview with Russian news site Readovka, which first reported on the arrest, Sonia Sitnikov, the suspects wife, claimed the arrest was actually related to a post her husband made on December 9, last year, when he shared a download link to the personal data of more than 300,000 COVID-19 patients that registered with the Moscow Department of Health. The data, which contained names, phone numbers, addresses, and COVID-19 status, sparked an outcry at the time, but Moscow officials eventually confirmed that the leak occurred because of a human error and not because of a malicious intrusion. Nevertheless, despite high-ranking officials admitting their mistake, Sitnikovs wife believes the investigation and the Anubis-related charges are payback for publicizing the leak last December. In an interview with The Record last year, Sitnikov touched on the sensitive nature of leaking data from Russian companies, such as banks, and the reason he did it. This data is obtained either from the banks themselves, or fraudulently by various cybercriminal groups or researchers. Either sold or leaked publicly. As long as the knowledge about the leak is hidden and not publicized, people affected by the leak continue to suffer. As soon as it is announced, the most important thing is that at least for the moment those who are mentioned in the leak think about their security. Sitnikov, who at one point claimed to have connections to Russian state-sponsored hacking group APT28 (Fancy Bear), has a long and muddled history on the cybercrime underground. A member of multiple underground hacking communities, Sitnikov previously sold and shared the source code of multiple malware strains, such as Carberp, Dexter, Alina, Rovnix, and Tinba; hence the reason why the recent charges did not surprise those who followed his past activity. Under Article 273, Part 2 of Russian criminal law, Sitnikov risks up to five years in prison.