Skip to content
nPm Hacks

nPm

  • Home
  • Privacy Policy
YouTube Channel

Hacking

Home » Hacking » Page 9

Pivoting with Metasploit

Posted by By nPm December 13, 2024Posted inHacking, Linux, Metasploit, Networking, Security, Tutorial, Virtual Machines0 Shares
We again explore pivoting, which is using a compromised machine to get to a previously inaccessible network. This time we use the Metasploit Framework and additionally discuss and demonstrate port forwarding in Metasploit. https://youtu.be/THa41WJg8C0?si=hz1RHIOx7mUJwW5y
Read More

Pivoting with Ligolo!

Posted by By nPm December 11, 2024Posted inHacking, Linux, Networking, Security, Tutorial, Virtual Machines0 Shares
Ligolo-ng is a simple, lightweight and fast tool that allows pentesters to establish tunnels from a reverse TCP/TLS connection using a tun interface (without the need of SOCKS). Link to Github repository!
Read More

Posts pagination

Previous page 1 … 7 8 9

Recent Posts

  • Offsec Proving Grounds Walkthrough – Vault
  • Hack the Box Walkthrough – Knife
  • Offsec Proving Grounds Walkthrough – Air
  • How to write a Windows 32-bit buffer overflow!
  • Hack the Box Walkthrough – Data

Categories

  • About Me
  • Backups
  • Canonical
  • Certification Exams
  • Cisco
  • Coding
  • Concerto Digital Signage
  • Containers
  • Debian
  • Docker
  • Ethical Hacking
  • Hacking
  • Hostname
  • HTB
  • ISC2
  • java
  • Javascript
  • Linux
  • Logs
  • Metasploit
  • msfvenom
  • Networking
  • Node.js
  • Offsec
  • Python
  • Raspberry Pi
  • Review
  • Security
  • Snort
  • Systemd
  • TryHackMe
  • Tutorial
  • Ubuntu
  • Ubuntu Server
  • Uncategorized
  • Virtual Machines
  • Virtualization
  • Walkthrough

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2023
  • October 2023
  • July 2023
  • Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware
  • Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid
  • Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
  • From Triage to Threat Hunts: How AI Accelerates SecOps
  • Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution
  • LinkedIn
  • GitHub
  • YouTube
Copyright 2026 — nPm Hacks. All rights reserved. Sinatra WordPress Theme
Scroll to Top