Skip to main content
🧠Educationalbeginner7 min read
β€’

Introducing Our Hack The Box Starting Point Series: Learning Penetration Testing Through Practice

Announcing a new educational series covering Hack The Box Starting Point machines. Starting with Tier 0 free boxes, we'll walk through real penetration testing scenarios step-by-step.

Hack The BoxHTBpenetration testingCTFeducationbeginner

🎯 Introducing Our Hack The Box Starting Point Series: Learning Penetration Testing Through Practice

If you're reading this, you're probably trying to learn penetration testing. Maybe you're a beginner who's heard about "hacking" and wants to understand what it really means. Maybe you're switching careers into cybersecurity. Or maybe you're already in IT and want to level up your offensive security skills.

Here's the thing: you can't learn penetration testing by reading alone. You need to get your hands dirty. You need to enumerate services, exploit vulnerabilities, and think like an attackerβ€”all in a safe, legal environment.

That's why I'm launching a new series of walkthroughs covering Hack The Box Starting Point machinesβ€”starting with Tier 0, the free boxes designed for absolute beginners.


πŸ” What Is Hack The Box?

Hack The Box (HTB) is an online platform that provides vulnerable machines for penetration testing practice. Unlike traditional tutorials, HTB gives you real systems to attackβ€”Linux and Windows machines running actual services with real vulnerabilities.

Starting Point is HTB's beginner-friendly series. It's designed for people who are new to penetration testing and want to learn the fundamentals:

  • Tier 0 β€” Four free machines covering basic enumeration, legacy protocols, and simple exploitation
  • Tier 1+ β€” More advanced machines (requires VIP subscription)

These machines are intentionally vulnerable, legally safe to attack, and perfect for learning.


πŸŽ“ Why I'm Writing These Walkthroughs

Let me be honest: when I started learning penetration testing, I struggled. I'd read about concepts like "port scanning" or "privilege escalation" but had no idea how to actually do them in practice. I needed examples. I needed someone to show me the thinking process, not just the commands.

That's what these walkthroughs will do.

Each post will:

  • Walk you through the machine step-by-step β€” Not just the answer, but the reasoning
  • Explain the tools and techniques β€” Why we use nmap instead of just guessing, how to interpret scan results, what to do with the information
  • Teach the underlying concepts β€” What you're actually learning and why it matters in real penetration tests
  • Provide context β€” How these vulnerabilities appear in real-world systems and why they're dangerous

Important: These walkthroughs are educational. I'll show you the methodology and techniques, but you'll still need to solve the machines yourself. The walkthroughs guide you through the process, not just the answer.


πŸ“š What to Expect

Starting with Tier 0

We're kicking off with Hack The Box Starting Point Tier 0, which includes four free machines:

  • Meow β€” Basic enumeration and legacy protocol risks (telnet)
  • Fawn β€” FTP basics and anonymous access
  • Dancing β€” SMB enumeration and network shares
  • Redeemer β€” Redis database exposure

Each machine teaches fundamental penetration testing concepts:

  • Reconnaissance β€” How to gather information about a target
  • Port scanning β€” Identifying open services and versions
  • Service enumeration β€” Understanding what services do and how to interact with them
  • Exploitation β€” Taking advantage of misconfigurations and vulnerabilities
  • Post-exploitation β€” Finding flags and understanding the system

Tier 0 is perfect for beginners because it assumes zero prior knowledge. If you've never done penetration testing before, these machines will teach you the basics step-by-step.

What Makes These Machines Different

Unlike CTF challenges that require obscure knowledge or guessing, HTB Starting Point machines focus on real-world scenarios:

  • Legacy protocols still in use (telnet, FTP)
  • Misconfigured services (anonymous access, default credentials)
  • Common security mistakes (exposed databases, unsecured network shares)

These are vulnerabilities you'll actually encounter in real penetration tests.


πŸ›  How to Use These Walkthroughs

For Beginners

  1. Read the walkthrough to understand the concepts and methodology
  2. Try the machine yourself before looking at solutions
  3. Use the walkthrough as a guide when you're stuck
  4. Experiment β€” try different tools, break things, learn

For Intermediate Learners

  1. Skip ahead if a machine seems too basic
  2. Focus on the methodology β€” how I approach each problem
  3. Challenge yourself β€” can you solve it differently?
  4. Apply the techniques to other HTB machines or labs

For Everyone

  • Don't just copy commands β€” understand what they do
  • Google is your friend β€” look up tool documentation, vulnerability details, examples
  • Take notes β€” write down what works and what doesn't
  • Join the community β€” HTB has forums and Discord channels

⚠️ A Few Ground Rules

Educational Purpose Only

These walkthroughs are for learning. Don't use these techniques against systems you don't own or don't have permission to test.

Everything you learn here should be applied ethically:

  • Only test systems you own or have written permission to test
  • Follow responsible disclosure practices
  • Respect privacy and data
  • Use your skills to help, not harm

Respect the Platform

Hack The Box provides these machines for free (Tier 0) or through subscription. Follow their rules:

  • Don't share flags publicly
  • Don't abuse the infrastructure
  • Don't use automated exploitation tools (unless the machine specifically allows it)
  • Clean up after yourself

πŸš€ What Makes These Walkthroughs Different

You can find HTB walkthroughs all over the internet. Here's what makes mine different:

Real-World Context

I don't just show you how to solve a machineβ€”I explain why these vulnerabilities matter in real penetration testing. How does finding an exposed telnet service relate to actual security assessments? What does anonymous FTP access teach you about securing file transfer services?

Beginner-Friendly

I assume you're starting from zero. I'll explain every tool, every command, and every step. No jargon without explanation.

Practical Methodology

I'll show you how I think about each problem. What do I check first? How do I narrow down possibilities? What do I do when I'm stuck?

Honest Learning

I'll call out when something is tricky. I'll explain mistakes I made. I'll show you that learning penetration testing is a process, not a destination.


πŸ“… What's Coming Next

Here's the plan:

  1. This introduction (you're reading it)
  2. Meow β€” Basic enumeration, telnet, and weak credentials
  3. Fawn β€” FTP enumeration and anonymous access
  4. Dancing β€” SMB enumeration and network share access
  5. Redeemer β€” Redis database exposure and exploitation

I'll publish walkthroughs regularly. Each post will include:

  • Objective β€” What the machine teaches
  • Reconnaissance β€” How to gather information
  • Enumeration β€” What services are running and how to interact with them
  • Exploitation β€” How to gain access
  • Post-exploitation β€” Finding the flag
  • Key Takeaways β€” What you learned and why it matters

πŸ’‘ Why This Matters

Penetration testing is a practical field. You can't learn it from books alone. You need to:

  • Enumerate real services
  • Exploit real vulnerabilities
  • Think creatively
  • Learn from mistakes

Hack The Box Starting Point provides a safe, legal environment to do exactly that. And these walkthroughs will help you get the most out of them.

Whether you're a complete beginner or someone looking to sharpen your skills, I hope these walkthroughs help you on your penetration testing journey.


🎯 Ready to Start?

The first walkthroughβ€”Hack The Box Starting Point: Meowβ€”will be published next. This machine teaches:

  • Basic enumeration β€” Using ping to verify connectivity
  • Port scanning β€” Using nmap to discover open services
  • Legacy protocols β€” Understanding the risks of telnet
  • Weak credentials β€” The dangers of default passwords

Meow is perfect for complete beginnersβ€”if you've never done penetration testing before, this machine will get you started with the fundamentals.

Questions about Hack The Box or this series? Reach out directly:


M Square LLC
Cybersecurity | Penetration Testing | No-Nonsense Advice

Found this helpful? Share it:

Need Help With This?

Have questions about implementing these security practices? Let's discuss your specific needs.

Get in Touch

More in Educational

Explore more articles in this category.

Browse 🧠 Educational

Related Articles