Red Teaming
JXoaT,
Apr 11
2025
First, AI shook things up, and now it's quantum computing’s turn to step into the spotlight.
Hack The Box (HTB) is diving into this frontier with our Quantum Computing Challenges, available on HTB Labs and as a Path in the HTB Enterprise Platform—and trust us, this technology is not as far away as you might think.
Sure, quantum threats sound like something out of a sci-fi movie, far removed from today's cybersecurity battles. But the reality? Planning for quantum-powered disruption is already happening. Right. Now.
Quantum computing isn’t just some experimental tech project; it's the next generational shift in computing—like going from dial-up to broadband, or flip phones to smartphones. And like every major leap forward, it’ll shake security’s foundations to their core.
Before we break down what you’ll be learning, let’s chat about why quantum computing should be on your radar, like, yesterday.
Relax—we’re not going to deep-dive into qubits or quantum mechanics (yet). What matters most right now are three races happening simultaneously:
Machines vs. machines.
Nation-states and major players racing against each other.
All of us, racing against the clock.
This form of computing already exists, and while we aren’t here to break down every aspect of their designs, it’s important to note what quantum supremacy means. It’s the first leg of our race, one between machines.
Quantum supremacy is the ability of a quantum computer to achieve a feat that goes beyond what our best supercomputers can do. It has been studied for a while, and in 2019, it was achieved during a collaboration between Google and NASA Loading Preview...
However, professionals work night and day to prepare these machines to handle more complex problems by addressing scalability issues, error correction, and hardware limitations. Still, there’s no denying we’ve hit a critical benchmark for their progress years ago.
What’s next? People.
Quantum computing is currently a global race with many interested parties. Our industry, in particular, will be a center point in the wake of change. But who exactly is involved?
Michio Kaku—celebrity physicist, futurist, and genuinely cool science guy—put it best in a recent interview Loading Preview...
“Anyone who’s interested in security is interested in quantum computing. They can crack almost any code that is based on digital technology. That’s why the FBI, the CIA, and all national governments are following this very closely.”
Sure, that’s a bold claim—but given the current trajectory of quantum tech, it’s not exactly far-fetched. Many organizations are working night and day across the globe trying to get closer to a machine that could change every aspect of major industry.
But that brings us to the last race category: time.
According to a 2023 risk study by Global Risk Institute (GRI) Loading Preview...
This chart from their timeline report speaks volumes on where certainty lies with foremost experts on a matter that will shift our entire way of life.
(The graph above is a representation of research done by the Global Risk Institute—find it here Loading Preview...
This is our race. It is an alarming amount of time—enough so that governments, tech giants, and cybersecurity pros aren’t waiting around. They're already busy creating post-quantum cryptography (PQC), encryption designed specifically to handle quantum threats.
In fact, the most current federal registry notice shared by NIST shows the 3 Federal Information Processing Standards (FIPS) Loading Preview...
FIPS 203, Module-Lattice-Based Key-Encapsulation Mechanism Standard Loading Preview...
FIPS 204, Module-Lattice-Based Digital Signature Standard Loading Preview...
FIPS 205, Stateless Hash-Based Digital Signature Standard Loading Preview...
It isn’t all doom and gloom, but there’s a lot of work that will need to be done.
But, here are the questions I’m sure you’ve been sitting with. Exactly what will be impacted? And what can we test you on?
I want to paint a quick picture of the impact of what quantum threats look like.
Here’s a quick rundown: Quantum computing’s kryptonite is a thing called Shor’s Algorithm, invented by mathematician Peter Shor in 1994. This quantum algorithm lets quantum computers effortlessly break through encryption methods currently keeping our digital lives safe.
Right now, many encryption schemes depend on huge numbers—like multiplying two massive primes. Cracking these with classical computers? Millions of years. Quantum computers with Shor’s Algorithm? Days (or less).
Here’s a snapshot of some encryption methods and tech that will be among the first casualties:
Quantity: 5 Challenges
Technology: Quantum
Category: Misc and Crypto
Difficulty: Intermediate
We know quantum threats sound intense. But that’s exactly why Hack The Box’s new Quantum Computing content exists—to get you ahead of the game. You’ll:
Learn quantum fundamentals like superposition and practice designing quantum circuits using key quantum gates.
Build quantum circuits yourself using Python’s Qiskit library, including cool stuff like quantum teleportation with CNOT and Hadamard gates.
Troubleshoot quantum teleportation protocols, putting theory into action.
Practice blending online resources to exploit vulnerabilities—bridging classical cryptography knowledge with cutting-edge quantum techniques.
Master advanced topics like ECC attacks, Frame-based Quantum Key Distribution, and specialized protocol vulnerabilities (think LL20 pair reuse attacks).
As quantum computing progresses, the urgency to protect systems once considered unbreakable will only grow. This path ensures your entire organization—from engineers to executives—is equipped to tackle these emerging threats, bridging the gap between complex quantum theory and practical security strategy.
Governments, enterprises, and cyber leaders are already preparing for the emerging quantum era—testing solutions, building internal expertise, and redefining risk models.
Is your organization doing the same?
All business customers with access to Dedicated Labs can start practicing on Quantum exploitation within the HTB Enterprise Platform Loading Preview... Loading Preview...
Quantum is coming fast, but now is the time to prepare. Get started with HTB Quantum Computing Challenges and make sure you're ready for the next era in cybersecurity.