#HackTheBox

Wen Bin :verified:kongwenbin@infosec.exchange
2026-02-03

💡 Understanding core network protocols is fundamental for any aspiring cyber security professional. One of the most common that you will encounter is SMB (Server Message Block).

In my latest video, I provide a detailed, beginner friendly walkthrough of the "DANCING" machine from Hack The Box, focusing entirely on SMB enumeration and access 🚀

You will learn:
🔹 What SMB (Server Message Block) is and how it works
🔹 Common SMB ports (139 & 445) and why they matter
🔹 How to use Nmap for targeted service enumeration such as SMB services
🔹 How to enumerate SMB shares using smbclient
🔹 Understanding anonymous / misconfigured shares
🔹 Downloading files from SMB shares and capturing the flag

This is a perfect starting point for anyone new to ethical hacking.

🎥 Watch the HTB DANCING walkthrough here:

youtube.com/watch?v=CpaBWeq9JU8

📂 Full playlist:

youtube.com/playlist?list=PL2m

If you are transitioning into cybersecurity, bug bounty, or pentesting - this series is built for you.

Happy learning and keep hacking ethically 🔐

#CyberSecurity #EthicalHacking #HackTheBox #PenetrationTesting #Learning #TechEducation #BeginnerHacking #HTBStartingPoint #Nmap #KaliLinux #SMB

2026-02-01

I decided to dust off some of my dormant pentesting skills. I picked up some Hack The Box, and after several rooted boxes I've now reached the Hacker rank. :dance_cool_doge:

labs.hackthebox.com/achievemen

#hackthebox #hacking #pentesting #ctf

Obtained the Hacker rank on HTB
Wen Bin :verified:kongwenbin@infosec.exchange
2026-01-27

Just published a new beginner-friendly walkthrough for Hack The Box Starting Point - FAWN (Tier 0).

This machine is an excellent introduction to FTP (File Transfer Protocol) and helps beginners understand:
🔹 How FTP works
🔹 Why FTP is insecure by design
🔹 What are the secure alternatives of FTP
🔹 How attackers enumerate services using Nmap
🔹 How anonymous FTP login works
🔹 What is the man command
🔹 How to retrieve files and capture the flag

Instead of rushing through commands, this walkthrough explains the concepts behind every step, which is something I wish I had when I first started learning ethical hacking.

If you are new to penetration testing or is an aspiring ethical hacker, Hack The Box Starting Point is a fantastic learning platform.

🎥 Watch the FAWN walkthrough here:

youtube.com/watch?v=SLFJOEq5w6Y

📂 Full playlist:

youtube.com/watch?v=OqxPRwP8t_

If you are transitioning into cybersecurity, bug bounty, or pentesting - this series is built for you.

Happy learning and keep hacking ethically 🔐

#CyberSecurity #EthicalHacking #HackTheBox #PenetrationTesting #Learning #TechEducation #BeginnerHacking #HTBStartingPoint #Nmap #KaliLinux #FTP

maschmiinw
2026-01-24

Phew...this took quite a while. But I learned a bunch of things. Besides the usual things like read carefully (or enumerate longer) and don't be scatty.

But finally I've got the root flag from the machine Browsed at

labs.hackthebox.com/achievemen

2026-01-22

Okay, that one was fun: I just pwned Steel Mountain on Hack The Box! labs.hackthebox.com/achievemen #HackTheBox #HTB

Wen Bin :verified:kongwenbin@infosec.exchange
2026-01-20

For beginners in cybersecurity, the "Starting Point" machines on Hack The Box are an invaluable resource. However, many tutorials simply tell you what to type to get the flag.

In my latest YouTube video, I take a different approach with the Meow machine (Tier-0).

I believe that to become a proficient penetration tester or bug bounty hunter, you need to understand the fundamentals.

🔹 What is the purpose of specific Nmap flags like -sV or -Pn?
🔹 How is a port scan like checking the doors of a house?
🔹 Why is Telnet considered insecure compared to SSH?

I break down these concepts step-by-step, ensuring that you are not just memorising commands, but actually learning the logic behind each step.

Whether you are a student, a career switcher, or just curious about ethical hacking, this walkthrough will give you the solid foundation you need.

This is part of an ongoing beginner-friendly series where I will be covering all of the Hack The Box Starting Point machines, step by step.

🎥 Watch the Meow walkthrough here:

youtube.com/watch?v=OqxPRwP8t_s

If you are transitioning into cybersecurity, bug bounty, or pentesting - this series is built for you.

Happy learning and keep hacking ethically 🔐

#CyberSecurity #EthicalHacking #HackTheBox #PenetrationTesting #Learning #TechEducation
cc: @hackthebox

Wen Bin :verified:kongwenbin@infosec.exchange
2026-01-13

Just released a beginner-friendly tutorial for anyone getting started on Hack The Box (HTB) - one of the best hands-on learning platforms for ethical hacking and cybersecurity.

In this video, I cover:
🔹 What is Hack The Box Starting Point
🔹 How to download the OpenVPN (.ovpn) configuration file
🔹 What OpenVPN is and why Hack The Box uses it
🔹 Why using a Virtual Machine (NAT mode) is safer than Docker or host
🔹 How to connect to the Hack The Box VPN using OpenVPN
🔹 How to spawn a machine and verify VPN connectivity with ping

📺 If you are new to ethical hacking (or want to get started), this guide will get you up and running in minutes.

🎥 Watch it here: youtube.com/watch?v=UkCDcS3X004

#cybersecurity #EthicalHacking #hackthebox #openvpn #infosec #vpnsetup #beginners #Linux #KaliLinux #Networking #BeginnerTutorial #htb #beginnerfriendly
cc: @hackthebox

maschmiinw
2026-01-03

Gavel was a fun box. Especially the privilege escalation was not the "usual" stuff.

labs.hackthebox.com/achievemen

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst