Skip to content
nPm Hacks

nPm

  • Home
  • Privacy Policy
YouTube Channel

javascript

  • Home
  • javascript

Offsec Proving Grounds Walkthrough – Bitest

Posted by By nPm December 5, 2025Posted inEthical Hacking, Hacking, Javascript, Linux, Networking, Node.js, Offsec, Security, Tutorial, Walkthrough0 Shares
This is a walkthrough of OffSec Proving Grounds machine "Bitest". It is rated as Intermediate but it was quite difficult and I had to get creative. We start by exploiting rsync and move on to a program called Vitest. Using a very recent exploit poc (2025) we are finally able…
Read More

Recent Posts

  • Offsec Proving Grounds Walkthrough – CVE-2023-46818
  • Offsec Proving Grounds Walkthrough – Nukem
  • Offsec Proving Grounds Walkthrough – Hepet
  • Offsec Proving Grounds Walkthrough – Nibbles
  • Offsec Proving Grounds Walkthrough – Hutch

Categories

  • About Me
  • Backups
  • Canonical
  • Certification Exams
  • Cisco
  • Coding
  • Concerto Digital Signage
  • Containers
  • Debian
  • Docker
  • Ethical Hacking
  • general
  • Hacking
  • Hostname
  • HTB
  • ISC2
  • java
  • Javascript
  • Linux
  • Logs
  • Metasploit
  • msfvenom
  • Networking
  • Node.js
  • Offsec
  • Python
  • Raspberry Pi
  • Review
  • Security
  • Snort
  • Systemd
  • TryHackMe
  • Tutorial
  • Ubuntu
  • Ubuntu Server
  • Uncategorized
  • Virtual Machines
  • Virtualization
  • Walkthrough

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2023
  • October 2023
  • July 2023
  • Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India
  • Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT
  • The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity
  • Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor
  • China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks
  • LinkedIn
  • GitHub
  • YouTube
Copyright 2026 — nPm Hacks. All rights reserved. Sinatra WordPress Theme
Scroll to Top