Skip to content
nPm Hacks

nPm

  • Home
  • Privacy Policy
YouTube Channel

networking

  • Home
  • networking
  • Page 9

Walkthrough – Offsec Proving Grounds – Kevin

Posted by By nPm January 2, 2025Posted inEthical Hacking, Hacking, Linux, Networking, Offsec, Security, Tutorial, Walkthrough0 Shares

This is a walkthrough of the “Kevin” machine in the Offsec Proving Grounds.   This video contains spoilers and shows you how to pwn the box so if you don’t want any help with it, don’t watch the video 🙂

Exploit Used

Continue Reading
Read More

Pivoting with Metasploit

Posted by By nPm December 13, 2024Posted inHacking, Linux, Metasploit, Networking, Security, Tutorial, Virtual Machines0 Shares
We again explore pivoting, which is using a compromised machine to get to a previously inaccessible network. This time we use the Metasploit Framework and additionally discuss and demonstrate port forwarding in Metasploit. https://youtu.be/THa41WJg8C0?si=hz1RHIOx7mUJwW5y
Read More

Pivoting with Ligolo!

Posted by By nPm December 11, 2024Posted inHacking, Linux, Networking, Security, Tutorial, Virtual Machines0 Shares
Ligolo-ng is a simple, lightweight and fast tool that allows pentesters to establish tunnels from a reverse TCP/TLS connection using a tun interface (without the need of SOCKS). Link to Github repository!
Read More

Mirroring Traffic in Preparation for Setting Up Snort

Posted by By nPm November 20, 2023Posted inLogs, Networking, Raspberry Pi, Security, Snort, Tutorial, Ubuntu0 Shares
Now that I finished my LPIC-2 certification, I am going to working on some security stuff. One of the things I wanted to learn more about was the IDS Snort. It is an open source IDS (Intrusion Detection System) and very popular so I figured it would be worthwhile to…
Read More

How to Have a Docker Container Use the Host Network

Posted by By nPm October 20, 2023Posted inContainers, Docker, Linux, Networking, Tutorial, Virtualization0 Shares
One of the things I really haven't mastered is Docker networking.  It just isn't intuitive to me.  What I have been able to do though, is have a container use the host address and be accessible to other hosts on the network.  For example, if you have Docker installed on…
Read More

Posts pagination

Previous page 1 … 7 8 9

Recent Posts

  • Offsec Proving Grounds Walkthrough – Snookums
  • Offsec Proving Grounds Walkthrough – CVE-2023-46818
  • Offsec Proving Grounds Walkthrough – Nukem
  • Offsec Proving Grounds Walkthrough – Hepet
  • Offsec Proving Grounds Walkthrough – Nibbles

Categories

  • About Me
  • Backups
  • Canonical
  • Certification Exams
  • Cisco
  • Coding
  • Concerto Digital Signage
  • Containers
  • Debian
  • Docker
  • Ethical Hacking
  • general
  • Hacking
  • Hostname
  • HTB
  • ISC2
  • java
  • Javascript
  • Linux
  • Logs
  • Metasploit
  • msfvenom
  • Networking
  • Node.js
  • Offsec
  • Python
  • Raspberry Pi
  • Review
  • Security
  • Snort
  • Systemd
  • TryHackMe
  • Tutorial
  • Ubuntu
  • Ubuntu Server
  • Uncategorized
  • Virtual Machines
  • Virtualization
  • Walkthrough

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2023
  • October 2023
  • July 2023
  • OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration
  • GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers
  • Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware
  • Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026
  • INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime
  • LinkedIn
  • GitHub
  • YouTube
Copyright 2026 — nPm Hacks. All rights reserved. Sinatra WordPress Theme
Scroll to Top