Skip to content
nPm Hacks

nPm

  • Home
  • Privacy Policy
YouTube Channel

Networking

Home » Networking » Page 6

Walkthrough – Offsec Proving Grounds – Kevin

Posted by By nPm January 2, 2025Posted inEthical Hacking, Hacking, Linux, Networking, Offsec, Security, Tutorial, Walkthrough0 Shares

This is a walkthrough of the “Kevin” machine in the Offsec Proving Grounds.   This video contains spoilers and shows you how to pwn the box so if you don’t want any help with it, don’t watch the video 🙂

Exploit Used

Continue Reading
Read More

Pivoting with Metasploit

Posted by By nPm December 13, 2024Posted inHacking, Linux, Metasploit, Networking, Security, Tutorial, Virtual Machines0 Shares
We again explore pivoting, which is using a compromised machine to get to a previously inaccessible network. This time we use the Metasploit Framework and additionally discuss and demonstrate port forwarding in Metasploit. https://youtu.be/THa41WJg8C0?si=hz1RHIOx7mUJwW5y
Read More

Pivoting with Ligolo!

Posted by By nPm December 11, 2024Posted inHacking, Linux, Networking, Security, Tutorial, Virtual Machines0 Shares
Ligolo-ng is a simple, lightweight and fast tool that allows pentesters to establish tunnels from a reverse TCP/TLS connection using a tun interface (without the need of SOCKS). Link to Github repository!
Read More

Mirroring Traffic in Preparation for Setting Up Snort

Posted by By nPm November 20, 2023Posted inLogs, Networking, Raspberry Pi, Security, Snort, Tutorial, Ubuntu0 Shares
Now that I finished my LPIC-2 certification, I am going to working on some security stuff. One of the things I wanted to learn more about was the IDS Snort. It is an open source IDS (Intrusion Detection System) and very popular so I figured it would be worthwhile to…
Read More

How to Have a Docker Container Use the Host Network

Posted by By nPm October 20, 2023Posted inContainers, Docker, Linux, Networking, Tutorial, Virtualization0 Shares
One of the things I really haven't mastered is Docker networking.  It just isn't intuitive to me.  What I have been able to do though, is have a container use the host address and be accessible to other hosts on the network.  For example, if you have Docker installed on…
Read More

Posts pagination

Previous page 1 … 4 5 6

Recent Posts

  • Offsec Proving Grounds Walkthrough – Bitest
  • Offsec Proving Grounds Walkthrough – BlackGate
  • Offsec Proving Grounds Walkthrough – Press
  • Hack the Box Walkthrough – Reset
  • TryHackMe Walkthrough – Soupedecode

Recent Comments

No comments to show.

Categories

  • About Me
  • Backups
  • Canonical
  • Certification Exams
  • Cisco
  • Coding
  • Concerto Digital Signage
  • Containers
  • Debian
  • Docker
  • Ethical Hacking
  • Hacking
  • Hostname
  • HTB
  • ISC2
  • Javascript
  • Linux
  • Logs
  • Metasploit
  • msfvenom
  • Networking
  • Node.js
  • Offsec
  • Python
  • Raspberry Pi
  • Review
  • Security
  • Snort
  • Systemd
  • TryHackMe
  • Tutorial
  • Ubuntu
  • Ubuntu Server
  • Virtual Machines
  • Virtualization
  • Walkthrough

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2023
  • October 2023
  • July 2023
  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • "Getting to Yes": An Anti-Sales Guide for MSPs
  • LinkedIn
  • GitHub
  • YouTube
Copyright 2025 — nPm Hacks. All rights reserved. Sinatra WordPress Theme
Scroll to Top