Skip to content
nPm Hacks

nPm

  • Home
  • Privacy Policy
YouTube Channel

HTB

Home » HTB

Hack the Box Walkthrough – Reset

Posted by By nPm November 21, 2025Posted inEthical Hacking, Hacking, HTB, Linux, Networking, Python, Security, Tutorial, Walkthrough0 Shares
This is a walkthrough of the Hack The Box machine called "Reset". It features the use of Burp Suite to analyze a website password reset, then deliver a payload by injecting it into the Apache2 access.log of the server, then we escalate our privileges by abusing rlogin and tmux .…
Read More

Hack the Box Walkthrough – Job

Posted by By nPm November 14, 2025Posted inEthical Hacking, Hacking, HTB, Linux, Networking, Security, Tutorial, Walkthrough0 Shares
🪄This is a walkthrough of the Hack The Box machine called "Job". It features the use of a phishing campaign utilizing malicious .odt LibreOffice files to gain initial access to the machine. We privesc by taking advantage of the impersonate privilege with printspoofer64! I learned a lot tackling this one.…
Read More

Hack the Box Walkthrough – Beep

Posted by By nPm November 7, 2025Posted inEthical Hacking, Hacking, HTB, Linux, Networking, Python, Security, Tutorial, Walkthrough0 Shares
This is a walkthrough of the Hack The Box machine called "Beep". It features the use of exploits to compromise Elastix/FreePBX, reverse shells, abusing binaries with the SUID set, and much more. I learned a lot tackling this one. You will need to lower your browsers TLS version to be…
Read More

Hack the Box Walkthrough – Baby

Posted by By nPm October 20, 2025Posted inEthical Hacking, Hacking, HTB, Networking, Security, Tutorial, Walkthrough0 Shares
This is a walkthrough of the Hack the Box machine called "Baby". It features the use of ldapsearch, nxc, kerbrute, evil-winrm, secretsdump, robocopy and much more. I learned a lot tackling this one, especially around dumping the ntds.dit (which we do using diskshadow). ***SPOILERS*** I show you how to pwn…
Read More

Hack the Box Walkthrough – Keeper

Posted by By nPm September 19, 2025Posted inEthical Hacking, Hacking, HTB, Linux, Networking, Python, Security, Tutorial, Walkthrough0 Shares
🚨This is a walkthrough of the Hack The Box machine called "Keeper". It features the use of default creds, python exploits, and tools like kpcli, putty-tools and more. I learned a lot tackling this one as we have to interact with a Keepass dump file and database and then convert…
Read More

Hack the Box Walkthrough – Devel

Posted by By nPm August 22, 2025Posted inEthical Hacking, Hacking, HTB, Linux, Metasploit, msfvenom, Networking, Security, Tutorial, Walkthrough0 Shares
This is a walkthrough of the Hack The Box machine called "Devel". It involves Microsoft IIS abuse using Metasploit and msfvenom, and finally using the Metasploit Framework exploit suggester to find a path to privesc. ***SPOILERS*** I show you how to pwn the box, so if you don't want help…
Read More

Hack the Box Walkthrough – Netmon

Posted by By nPm August 8, 2025Posted inEthical Hacking, Hacking, HTB, Linux, Python, Security, Tutorial, Walkthrough0 Shares
This is a walkthrough of the Hack the Box machine called "Netmon". It involves FTP abuse, python exploits, password guessing and more. ***SPOILERS*** I show you how to pwn the box, so if you don't want help with it do not watch this video. Hope this helps someone and I…
Read More

Hack the Box Walkthrough – Buff

Posted by By nPm July 25, 2025Posted inEthical Hacking, Hacking, HTB, msfvenom, Networking, Security, Tutorial, Walkthrough0 Shares
New video! This is a walkthrough of the Hack The Box machine called "Buff". It features the use of tools like PowerShell, chisel, msfvenom and more. I learned a lot about modifying exploits tackling this one. ***SPOILERS*** I show you how to pwn the box, so if you don't want…
Read More

Hack the Box Walkthrough – Lame

Posted by By nPm July 11, 2025Posted inEthical Hacking, Hacking, HTB, Linux, Metasploit, msfvenom, Networking, Security, Tutorial, Walkthrough0 Shares
This is a walkthrough of the Hack the Box machine called "Lame". It involves using Metasploit to exploit Samba and more. **SPOILERS** I show you how to pwn the box, so if you don't want help with it do not watch this video. Hope this helps someone and I hope…
Read More

Hack the Box Walkthrough – Legacy

Posted by By nPm June 27, 2025Posted inEthical Hacking, Hacking, HTB, Metasploit, Networking, Security, Tutorial, Walkthrough0 Shares
This is a walkthrough of the Hack The Box machine called "Legacy". It involves exploiting SMB using Metasploit and more. ***SPOILERS*** I show you how to pwn the box, so if you don't want help with it do not watch this video. Hope this helps someone and I hope you…
Read More

Posts pagination

1 2 3 Next page

Recent Posts

  • Offsec Proving Grounds Walkthrough – Bitest
  • Offsec Proving Grounds Walkthrough – BlackGate
  • Offsec Proving Grounds Walkthrough – Press
  • Hack the Box Walkthrough – Reset
  • TryHackMe Walkthrough – Soupedecode

Recent Comments

No comments to show.

Categories

  • About Me
  • Backups
  • Canonical
  • Certification Exams
  • Cisco
  • Coding
  • Concerto Digital Signage
  • Containers
  • Debian
  • Docker
  • Ethical Hacking
  • Hacking
  • Hostname
  • HTB
  • ISC2
  • Javascript
  • Linux
  • Logs
  • Metasploit
  • msfvenom
  • Networking
  • Node.js
  • Offsec
  • Python
  • Raspberry Pi
  • Review
  • Security
  • Snort
  • Systemd
  • TryHackMe
  • Tutorial
  • Ubuntu
  • Ubuntu Server
  • Virtual Machines
  • Virtualization
  • Walkthrough

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2023
  • October 2023
  • July 2023
  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • "Getting to Yes": An Anti-Sales Guide for MSPs
  • LinkedIn
  • GitHub
  • YouTube
Copyright 2025 — nPm Hacks. All rights reserved. Sinatra WordPress Theme
Scroll to Top