• Home
  • About Us
  • General
  • Wireless
  • Web
  • Scanning
  • Metasploit
  • Hacking Courses
    • OSCP
    • The Virtual Hacking Labs
    • Certified Ethical Hacker (CEH)
    • Hacking Books
  • More
    • Exploit tutorials
    • Pentesting Exchange
    • Networking
    • Malware Analysis
    • Hacking Metasploitable 2/3
    • Digital Forensics
  • Contact
Facebook Twitter Instagram
Trending
  • CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability
  • Installing Rogue-jndi on Kali Linux
  • Log4Shell VMware vCenter Server (CVE-2021-44228)
  • The Great Leak: Microsoft Exchange AutoDiscover Design Flaw
  • CVE-2019-19781: Citrix ADC RCE vulnerability
  • Vulnerability Scanning with OpenVAS 9 part 4: Custom scan configurations
  • Vulnerability Scanning with OpenVAS 9 part 3: Scanning the Network
  • Vulnerability Scanning with OpenVAS 9 part 2: Vulnerability Scanning
Facebook Twitter YouTube Tumblr Instagram Pinterest
Hacking Tutorials
  • Home
  • About Us
  • General
  • Wireless
  • Web
  • Scanning
  • Metasploit
  • Hacking Courses
    • OSCP
    • The Virtual Hacking Labs
    • Certified Ethical Hacker (CEH)
    • Hacking Books
  • More
    • Exploit tutorials
    • Pentesting Exchange
    • Networking
    • Malware Analysis
    • Hacking Metasploitable 2/3
    • Digital Forensics
  • Contact
Hacking Tutorials
You are at:Home » General Tutorials » Hacking Tutorials 2018
Hacking Tutorials 2018

Hacking Tutorials 2018

1
By Hacking Tutorials on December 30, 2017 General Tutorials

With less than a day to go we will welcome 2018 and we can look back at a great 2017 for the Hacking Tutorials website. In this small post I want to quickly stop by some accomplishments of 2017 and the Hacking Tutorials 2018 plans. The past year has been a great year for Hacking Tutorials and many new tutorials have been added to the website. Since 2015, the start of the Hacking Tutorials website, we have mainly published hacking tutorials that cover the basics of penetration testing. For 2017 (and 2018) we’ve raised the bar a bit by covering some more advanced subjects such as the basics of buffer overflow vulnerabilities, port forwarding techniques, advanced Netcat techniques and exploitation tutorials covering the full process of enumeration to exploitation and remediation. The latter can be found in the exploitation section of the website. Some other accomplishments for 2017 include the launch of the Virtual Hacking Labs, the switch from http to https (yes, finally!) and the first guest post by my friend Kgomotso Pule (hopefully the first of many!).

The Virtual Hacking Labs

In the Hacking Tutorials 2017 post of last year we’ve mentioned a focus on hands-on practical training in the field of penetration testing and ethical hacking in our plans for 2017. The implementation of these plans has led to the successful Virtual Hacking Labs platform with hundreds of students originating from almost 50 different countries. A great success that has been achieved in the first 6 months since the launch in May. However, true success cannot be measured by numbers only but by customer satisfaction. You can read what others have to say about the penetration testing course on the Virtual Hacking Labs Reviews page. We were very delightful to see that many students used the VHL penetration testing course and online labs in preparation for the OSCP course, from which some students already passed the notorious 24 hours exam.

Hacking Tutorials 2018

Let’s have a look at the plans Hacking Tutorials 2018 plans. The plans are mainly based on expanding the number of tutorials and broadening the range of subjects. For 2018 we’re planning to add the following hacking tutorials and reviews:

  • More web application penetration testing tutorials. With a strong focus on how to exploit, prevent or mitigate this type of vulnerabilities.
  • A full review of Mile2’s most advanced penetration testing course: Certified Penetration Testing Consultant (CPTC). As Mile2 courses were relatively unknown to me I was really curious to try this well priced course. The review of this course will be published in February on Hacking Tutorials!
  • More Penetration Testing Tutorials covering more advanced techniques.
  • More hacking book reviews. If you would like to review a specific book or like your book to be reviewed, please contact us!

For now I wish you a Happy New Year! That you may pop lots of shells and all your dreams get executed as root in 2018!

Virtual Hacking Labs - Penetration testing lab
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleEnumerating LinkedIn with Inspy
Next Article The Best Hacking Books 2018

Related Posts

CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

Installing Rogue-jndi on Kali Linux

The Great Leak: Microsoft Exchange AutoDiscover Design Flaw

1 Comment

  1. Kgomotso Pule on January 1, 2018 1:44 pm

    Thank you, HT! :-) Talk about pressure… I certainly hope that there’ll be a guest blog post soon.

    I would like to congratulate the HT and VHL team for creating an amazing content. I believe that many CEHs and aspiring OSCPs can find value in your material. VHL is very good and can help students of various backgrounds to learn a lot.

    Keep up the good work! We can’t wait for what you’ve got in store for us in 2018…

    Reply

Leave A Reply Cancel Reply

Top Tutorials
By Hacking TutorialsOctober 29, 20220

CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

By Hacking TutorialsJanuary 10, 20220

Installing Rogue-jndi on Kali Linux

By Hacking TutorialsDecember 17, 20210

Log4Shell VMware vCenter Server (CVE-2021-44228)

By Hacking TutorialsSeptember 27, 20210

The Great Leak: Microsoft Exchange AutoDiscover Design Flaw

By Hacking TutorialsFebruary 4, 20200

CVE-2019-19781: Citrix ADC RCE vulnerability

By Hacking TutorialsNovember 1, 20188

Vulnerability Scanning with OpenVAS 9 part 4: Custom scan configurations

Subscribe

Enter your email address to subscribe to Hacking Tutorials and receive notifications of new tutorials by email.

Join 828 other subscribers
Recent Tutorials
  • CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability
  • Installing Rogue-jndi on Kali Linux
  • Log4Shell VMware vCenter Server (CVE-2021-44228)
  • The Great Leak: Microsoft Exchange AutoDiscover Design Flaw
  • CVE-2019-19781: Citrix ADC RCE vulnerability
Virtual Hacking Labs
Penetration Testin Course and Hacking Labs
Categories
  • Digital Forensics
  • Exploit tutorials
  • General Tutorials
  • Hacking Books
  • Hacking Courses
  • Malware Analysis Tutorials
  • Metasploit Tutorials
  • Networking
  • Pentesting Exchange
  • Scanning Tutorials
  • Web Applications
  • Wifi Hacking Tutorials
Downloads
  • directory_scanner.py (120572 downloads)
  • PEiD-0.95-20081103.zip (111425 downloads)
  • wifi_jammer.py (138169 downloads)
Recent Tutorials
  • CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability
  • Installing Rogue-jndi on Kali Linux
  • Log4Shell VMware vCenter Server (CVE-2021-44228)
  • The Great Leak: Microsoft Exchange AutoDiscover Design Flaw
  • CVE-2019-19781: Citrix ADC RCE vulnerability
  • Vulnerability Scanning with OpenVAS 9 part 4: Custom scan configurations
Popular Tutorials
By Hacking TutorialsSeptember 1, 2016115

Review: Offensive Security Certified Professional (OSCP)

By Hacking TutorialsApril 18, 201738

Exploiting Eternalblue for shell with Empire & Msfconsole

By Hacking TutorialsMarch 17, 201637

Installing VPN on Kali Linux 2016 Rolling

Featured Downloads
  • directory_scanner.py (120572 downloads)
  • PEiD-0.95-20081103.zip (111425 downloads)
  • wifi_jammer.py (138169 downloads)
© Hacking Tutorials 2022

Type above and press Enter to search. Press Esc to cancel.

Go to mobile version