New HTB walkthrough: REDEEMER (Tier 0) - Redis fundamentals for beginners.
Redis is everywhere! Caching, session stores, job queues – and when it is exposed or misconfigured, it can leak sensitive data. I just published a beginner-focused walkthrough that covers:
🔹 How sensitive data can be stored directly in memory
🔹 What Redis is and common use cases
🔹 Why you shouldn't expose Redis without authentication
🔹 How to identify Redis with Nmap (port 6379)
🔹 How to connect with "redis-cli", enumerate keys and databases
🔹 Why "KEYS *" is fine for CTFs but use "SCAN" in production
This is part of my ongoing Hack The Box Starting Point – Step-by-Step Walkthrough for Beginners series, where the goal is to help newcomers build strong fundamentals in ethical hacking.
🎥 Watch the HTB Redeemer walkthrough here:
▶ https://www.youtube.com/watch?v=81JN1vy1HGY
📂 Full playlist:
▶ https://www.youtube.com/playlist?list=PL2mncq0mb-6iZ6ngDmwGEywmxnCYwO2s_
If you are transitioning into cybersecurity, bug bounty, or pentesting - this series is built for you.
Happy learning and keep hacking ethically 🔐
#CyberSecurity #EthicalHacking #HackTheBox #PenetrationTesting #Learning #TechEducation #BeginnerHacking #HTBStartingPoint #Nmap #KaliLinux #redis


![A screenshot of an episode of a television series. On screen, a terminal window is displayed on a computer. In the window, nmap is being run with the arguments "-sT -A localhost". The nmap results show it detected ssh on port 22, sunrpc on port 111, printer on port 5, X11 on port 600, and "Low Power Wide Area Network [unknown]" on port 1.](https://files.mastodon.social/cache/media_attachments/files/115/761/285/382/440/018/small/a38d1e70896f2339.png)





