• Home
  • About Us
  • General
  • Wireless
  • Web
  • Scanning
  • Metasploit
  • Hacking Courses
    • OSCP
    • The Virtual Hacking Labs
    • Certified Ethical Hacker (CEH)
    • Hacking Books
  • More
    • Exploit tutorials
    • Pentesting Exchange
    • Networking
    • Malware Analysis
    • Hacking Metasploitable 2/3
    • Digital Forensics
  • Contact
Facebook Twitter Instagram
Trending
  • CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability
  • Installing Rogue-jndi on Kali Linux
  • Log4Shell VMware vCenter Server (CVE-2021-44228)
  • The Great Leak: Microsoft Exchange AutoDiscover Design Flaw
  • CVE-2019-19781: Citrix ADC RCE vulnerability
  • Vulnerability Scanning with OpenVAS 9 part 4: Custom scan configurations
  • Vulnerability Scanning with OpenVAS 9 part 3: Scanning the Network
  • Vulnerability Scanning with OpenVAS 9 part 2: Vulnerability Scanning
Facebook Twitter YouTube Tumblr Instagram Pinterest
Hacking Tutorials
  • Home
  • About Us
  • General
  • Wireless
  • Web
  • Scanning
  • Metasploit
  • Hacking Courses
    • OSCP
    • The Virtual Hacking Labs
    • Certified Ethical Hacker (CEH)
    • Hacking Books
  • More
    • Exploit tutorials
    • Pentesting Exchange
    • Networking
    • Malware Analysis
    • Hacking Metasploitable 2/3
    • Digital Forensics
  • Contact
Hacking Tutorials
You are at:Home » Hacking Courses » Course: The Virtual Hacking Labs
Virtual Hacking Labs

Course: The Virtual Hacking Labs

0
By Hacking Tutorials on May 24, 2017 Hacking Courses

In this article on Hacking Tutorials we will be looking at a new penetration testing course priced at only $99,- offered by a newcomer on the block: The Virtual Hacking Labs. The Virtual Hacking Labs & Hacking Tutorials offer a full penetration testing course that includes access to an online penetration testing lab for practical training. The penetration testing lab contains 30 vulnerable machines that can be used to practice penetration testing techniques and tools in a safe way. All vulnerable machines and scenarios are based on real life scenarios as you would encounter on real company networks. After completing the courseware and the lab machines the student will have a good understanding of basic penetration testing techniques and practical experience applying these techniques.

Penetration Testing Courseware

The penetration testing course and the virtual labs are targeting both beginning and experienced penetration testers. The courseware covers subjects like enumeration, vulnerability assessments and exploitation from the ground up and teaches the student techniques that can be used to compromise machines on the lab network. More experienced penetration testers can use the lab machines on the lab network to sharpen their pentesting skills. The courseware is offered both online and offline. The online courseware is accessible from the website and contains functionality to track progress. The offline courseware is a downloadable PDF that is included with a month pass or greater.

Let’s have a look at an overview of the subjects that are covered in the online hacking course:

Virtual Hacking Labs – Penetration Testing Courseware overview

There is also a free courseware sample available that can be requested here:

Virtual Hacking Labs Network

The penetration testing lab network consists of 30 vulnerable custom hosts that are based on real life scenarios and can be accessed by connecting to the VPN. The network contains a wide range of multi purpose devices and appliances such as domain controllers, firewalls, webservers, fileservers, NAS devices and clients that are vulnerable in one or more ways. In the labs you will learn how to exploit software and services running all major operating systems such as Windows, Linux, FreeBSD and Android. All hosts on the network have been designed by the Virtual Hacking Labs to contribute to a specific learning experience. This learning experience can be anything ranging from identifying and exploiting vulnerabilities in web applications and operating systems to analysing and modifying exploit code.

The vulnerable machines are being updated on a regular basis in order to provide scenarios with recently discovered vulnerabilities.

Penetration Testing VM’s

Accessing the Virtual Hacking Labs is as easy as logging in a VPN client on one of the pre-installed VM’s. The Virtual Hacking Labs offer a download for a pre-installed Kali Linux 2017.1 and Parrot OS 3.5 pentesting machine with every subscription. Both VM’s include a pre-installed VPN client so there is no need to go trough difficult installation procedures. The courseware also includes a detailed description on how to install the VM’s on VMWare Player free. Of course you can also use your own penetration testing distro to access the Virtual Hacking Labs. In this case you only need to download the client software on the VHL website.

Virtual Hacking Labs VMs
Virtual Hacking Labs Penetration Testing Machines.

Personal Reset Panel

All students have access to a personal reset panel that can be used to reset hosts back to their original, vulnerable state. Resetting a host is especially useful when it’s left in an non-exploitable state by another student or yourself. An example of such state is a system that has crashed or became unstable because of a kernel exploit. This way every student proceeds through the course and labs without needing to wait on timed resets or administrator interference.

A small overview of the vulnerable hosts in the personal reset panel.

Certificate of Completion

Students who have compromised at least 20 machines on the lab network can request a Certificate of Completion. In order to apply for this certificate a student needs to document the exploitation process for each host and supply proof of this. To become eligible for the Virtual Hacking Labs Certificate of Completion a student needs to:

  • Get administrator access on at least 20 lab machines.
  • Provide documentation of the exploitation process.
  • Include screenshots proving that you have administrator access to the compromised host.
  • Supply the contents of key.txt files on the rooted lab machines.

When all documentation is submitted by e-mail to the VHL team, the Certificate will be issued shortly after approval of the supplied documentation.

The Virtual Hacking Labs Certificate of Completion is only available for students who have purchased a month pass or greater. The week pass does not include the certificate.

Pricing

The pricing for the penetration testing course and lab access is subscription based and priced at $99,- for 1 month access. A major pro of the subscription based model compared to a flat fee is that anyone can decide for themselves how much to spend on this course. If you are an experienced penetration tester and/or you can spend a lot of time on the course, it is possible to finish the courseware and 20 machines in a month time. If you have less time to spend or you are a beginner in the field of penetration testing, then the 3 month access pass might be a better choice. This access pass is priced at $249,- for 3 months.

Virtual Hacking Labs access passes
Virtual Hacking Labs Pricing.

If you are a very experienced penetration tester or you can spend a lot of time on the course, it is possible to finish the courseware and 20 machines in a month time. Otherwise 3 months is a better choice.

Don’t forget to check out the Virtual Hacking Labs Reviews page to see what others have to say about this penetration testing course!

What happens after signing up?

After signing up you will receive a few e-mails with the credentials to access the labs and information about where to find the VM downloads and courseware. After downloading the VM you can boot it with VMware Player Free and use the pre-installed VPN client to connect to the labs. If you purchased a month pass or greater you can also download the courseware from you user panel. The online courseware will be available on the course page on the website.

Virtual Hacking Labs - Penetration testing lab

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleEternalromance: Exploiting Windows Server 2003
Next Article How to setup Metasploitable 3 on Windows 10

Related Posts

CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

Installing Rogue-jndi on Kali Linux

Vulnerability Scanning with OpenVAS 9 part 3: Scanning the Network

Comments are closed.

Top Tutorials
By Hacking TutorialsOctober 29, 20220

CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

By Hacking TutorialsJanuary 10, 20220

Installing Rogue-jndi on Kali Linux

By Hacking TutorialsDecember 17, 20210

Log4Shell VMware vCenter Server (CVE-2021-44228)

By Hacking TutorialsSeptember 27, 20210

The Great Leak: Microsoft Exchange AutoDiscover Design Flaw

By Hacking TutorialsFebruary 4, 20200

CVE-2019-19781: Citrix ADC RCE vulnerability

By Hacking TutorialsNovember 1, 20188

Vulnerability Scanning with OpenVAS 9 part 4: Custom scan configurations

Subscribe

Enter your email address to subscribe to Hacking Tutorials and receive notifications of new tutorials by email.

Join 828 other subscribers
Recent Tutorials
  • CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability
  • Installing Rogue-jndi on Kali Linux
  • Log4Shell VMware vCenter Server (CVE-2021-44228)
  • The Great Leak: Microsoft Exchange AutoDiscover Design Flaw
  • CVE-2019-19781: Citrix ADC RCE vulnerability
Virtual Hacking Labs
Penetration Testin Course and Hacking Labs
Categories
  • Digital Forensics
  • Exploit tutorials
  • General Tutorials
  • Hacking Books
  • Hacking Courses
  • Malware Analysis Tutorials
  • Metasploit Tutorials
  • Networking
  • Pentesting Exchange
  • Scanning Tutorials
  • Web Applications
  • Wifi Hacking Tutorials
Downloads
  • directory_scanner.py (120573 downloads)
  • PEiD-0.95-20081103.zip (111426 downloads)
  • wifi_jammer.py (138171 downloads)
Recent Tutorials
  • CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability
  • Installing Rogue-jndi on Kali Linux
  • Log4Shell VMware vCenter Server (CVE-2021-44228)
  • The Great Leak: Microsoft Exchange AutoDiscover Design Flaw
  • CVE-2019-19781: Citrix ADC RCE vulnerability
  • Vulnerability Scanning with OpenVAS 9 part 4: Custom scan configurations
Popular Tutorials
By Hacking TutorialsSeptember 1, 2016115

Review: Offensive Security Certified Professional (OSCP)

By Hacking TutorialsApril 18, 201738

Exploiting Eternalblue for shell with Empire & Msfconsole

By Hacking TutorialsMarch 17, 201637

Installing VPN on Kali Linux 2016 Rolling

Featured Downloads
  • directory_scanner.py (120573 downloads)
  • PEiD-0.95-20081103.zip (111426 downloads)
  • wifi_jammer.py (138171 downloads)
© Hacking Tutorials 2022

Type above and press Enter to search. Press Esc to cancel.

Go to mobile version