Student Reviews
                
                    
                            
    
    
    
    
                    
                    ( 5 Of 5 )
                
                1 review
             
         
        
        
     
          
        
            
                
                    Video of Coding in Cybersecurity: Beyond the Tools and Scanners   HackTheBox Coding Challenges in Web PenTesting course by Motasem Hamdan channel, video No. 112 free certified online                
            
            
                In this video, I’ll show you how to solve real coding challenges from HackTheBox using Python. If you're a cybersecurity enthusiast who wants to go beyond tools and GUIs, this one’s for you. This video focuses on coding-driven CTFs, especially those that require careful parsing, algorithmic logic, or exploit proof-of-concepts. The challenges I solve in this post are retired challenges and are listed below:
HackTheBox Threat Index
HackTheBox Oddly Even
HackTheBox Reversal
HackTheBox Addition
HackTheBox Triple Knock
HackTheBox MiniMax
HackTheBox Honeypot
HackTheBox BlackWire
HackTheBox Insane Bolt
HackTheBox Ghost Path
Receive Cyber Security Field, Certifications Notes and Special Training Videos 
https://buymeacoffee.com/notescatalog/membership
Writeup
https://motasem-notes.net/practical-coding-in-cyber-security-hackthebox-coding-challenges/#HackTheBox_Triple_Knock_Description
Store
https://buymeacoffee.com/notescatalog/extras
Patreon
https://www.patreon.com/motasemhamdan
Instagram
https://www.instagram.com/motasem.hamdan.official/
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/
TikTok
https://www.tiktok.com/@motasemhamdan0
0:00 - Why Coding Matters in Cybersecurity 
1:01 - Practical Use Case: Hack The Box Coding Challenges 
1:53 - Overview of Threat Index Challenge 
2:59 - Threat Score Formula Explained 
4:09 - Input Example and Expected Output 
5:03 - Building the Keyword-Weight Dictionary 
6:02 - Looping Through Keywords to Calculate Score 
8:22 - Running the Code and Getting the Flag 
8:42 - Intro to Triple Log Challenge 
9:33 - Detecting Brute Force Login Attempts 
10:17 - Reading Log Entries and Users 
11:10 - Storing Failed Login Timestamps 
12:25 - Converting Timestamps into Minutes 
13:04 - Sliding Window Logic for Detection 
13:40 - Outputting the Flagged Users 
14:16 - Final Thoughts and Goodbye