{"id":538,"date":"2025-12-01T16:02:00","date_gmt":"2025-12-01T21:02:00","guid":{"rendered":"https:\/\/sites.udmercy.edu\/cyberclub\/?p=538"},"modified":"2026-03-26T17:39:37","modified_gmt":"2026-03-26T21:39:37","slug":"12-01-25-exploring-hackthebox-a-live-demonstration","status":"publish","type":"post","link":"https:\/\/sites.udmercy.edu\/cyberclub\/2025\/12\/01\/12-01-25-exploring-hackthebox-a-live-demonstration\/","title":{"rendered":"12\/01\/25 &#8211; Exploring the HackTheBox Cyber Range: A Live Demonstration"},"content":{"rendered":"\n<p>Wrapping up the Fall 2025 semester, Cyber Club Technician Harrison Haviland-Longo served as our featured speaker, leading an excellent HackTheBox Cyber Range demonstration for club members. Harrison walked members through an end-to-end attack scenario, breaking down each phase from reconnaissance to exploitation while highlighting how exposed services can enable lateral movement within a network. The demonstration was designed to be approachable for members at all skill levels, with Harrison explaining each tool and technique as he worked through the challenge in real time.<\/p>\n\n\n\n\t<div class='ngg-imagebrowser default-view'\n\t\tid='ngg-imagebrowser-07f926a7aa8c8baf87c1276fa778b750-538'\n\t\tdata-nextgen-gallery-id=\"07f926a7aa8c8baf87c1276fa778b750\">\n\n\t\t<h3>Harrison Explains BeanShooter<\/h3>\n\n\t\t<div id=\"ngg-image-0\" class=\"pic\" \n\t\t\t\t\t>\n\t\t<a href='https:\/\/sites.udmercy.edu\/cyberclub\/wp-content\/uploads\/sites\/533\/nggallery\/exploring-htb\/IMG_20260326_160751.jpg'\n\t\t\ttitle='Harrison gives students a detailed explanation of each tool used in the demo.'\n\t\t\tdata-src=\"https:\/\/sites.udmercy.edu\/cyberclub\/wp-content\/uploads\/sites\/533\/nggallery\/exploring-htb\/IMG_20260326_160751.jpg\"\n\t\t\tdata-thumbnail=\"https:\/\/sites.udmercy.edu\/cyberclub\/wp-content\/uploads\/sites\/533\/nggallery\/exploring-htb\/thumbs\/thumbs-IMG_20260326_160751.jpg\"\n\t\t\tdata-image-id=\"136\"\n\t\t\tdata-title=\"Harrison Explains BeanShooter\"\n\t\t\tdata-description=\"Harrison gives students a detailed explanation of each tool used in the demo.\"\n\t\t\tclass=\"ngg-simplelightbox\" rel=\"07f926a7aa8c8baf87c1276fa778b750\">\n\t\t\t<img title='Harrison Explains BeanShooter'\n\t\t\t\talt='Harrison Explains BeanShooter'\n\t\t\t\tsrc='https:\/\/sites.udmercy.edu\/cyberclub\/wp-content\/uploads\/sites\/533\/nggallery\/exploring-htb\/IMG_20260326_160751.jpg'\/>\n\t\t<\/a>\n\t\t\n\t\t<\/div>\n\t\t<div class='ngg-imagebrowser-nav'>\n\n\t\t\t<div class='back'>\n\t\t\t\t<a class='ngg-browser-prev'\n\t\t\t\t\tid='ngg-prev-139'\n\t\t\t\t\thref='https:\/\/sites.udmercy.edu\/cyberclub\/2025\/12\/01\/12-01-25-exploring-hackthebox-a-live-demonstration\/nggallery\/image\/img_20260326_160801\/'>\n\t\t\t\t\t<i class=\"fa fa-chevron-left\" aria-hidden=\"true\"><\/i>\n\t\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class='next'>\n\t\t\t\t<a class='ngg-browser-next'\n\t\t\t\t\tid='ngg-next-137'\n\t\t\t\t\thref='https:\/\/sites.udmercy.edu\/cyberclub\/2025\/12\/01\/12-01-25-exploring-hackthebox-a-live-demonstration\/nggallery\/image\/img_20260326_160753\/'>\n\t\t\t\t\t<i class=\"fa fa-chevron-right\" aria-hidden=\"true\"><\/i>\n\t\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class='counter'>\n\t\t\t\tImage\t\t\t\t1\t\t\t\tof\t\t\t\t4\t\t\t<\/div>\n\n\t\t\t<div class='ngg-imagebrowser-desc'>\n\t\t\t\t<p>Harrison gives students a detailed explanation of each tool used in the demo.<\/p>\n\t\t\t<\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n\n<p>Demonstrations like this give our members hands-on exposure to the tools and methodologies used by ethical hackers, helping bridge the gap between classroom knowledge and real-world application. We thank Harrison for putting together a comprehensive and engaging session to close out the semester.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wrapping up the Fall 2025 semester, Cyber Club Technician Harrison Haviland-Longo served as our featured speaker, leading an excellent HackTheBox Cyber Range demonstration for club &hellip;<\/p>\n","protected":false},"author":699,"featured_media":545,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":136},"categories":[8],"tags":[],"jetpack_featured_media_url":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-content\/uploads\/sites\/533\/2026\/03\/nggallery_import\/IMG_20260326_160751.jpg","_links":{"self":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/posts\/538"}],"collection":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/users\/699"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/comments?post=538"}],"version-history":[{"count":2,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/posts\/538\/revisions"}],"predecessor-version":[{"id":570,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/posts\/538\/revisions\/570"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/media\/545"}],"wp:attachment":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/media?parent=538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/categories?post=538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/tags?post=538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}