I am wondering how "real world" is HTB?
Let's say we have three typologies of "hacking."
The first is CTF scenarios like HTB. The second is the activities performed by professional pentesters. The third are the actions of criminal hackers (or "crackers" if you prefer).
How do CTF-type challenges like HTB differ from the type of tasks engaged in by pentesters?
I don't know how many active pentesters might read this so I certainly don't mind speculation from those who are not (yet) pentesters.