Free downloads for hacking related courses
ISO images and virtual machines
Check the following tables to find which ISO image and virtual machines you will need for your course and download them from the link in the header of the tables.
You will need to do this before starting the course.
ISO images
These images contain the required softwares to install a web server, SQL Server and the tools we use for hacking.
ISO images | ||||||
---|---|---|---|---|---|---|
MetasploitExploit | LFI/RFI | Malware | SQLinjection* | Portscan | Trojan | |
Course name | 1.5GB | 3GB | 1.4GB | 1GB | 177MB | 1GB |
Advanced Metasploit | X | |||||
Computer forensics | ||||||
Deep dive into exploit writing | X | |||||
Local & Remote File Inclusion | X | |||||
Malware analysis | X | |||||
Mastering SQL injection | X | |||||
Port scanning in depth | X | |||||
The secret life of Trojans | X |
Virtual machines
Instead of the virtual machines below, you can use your own machine as well if you have the following versions: Windows Server 2008 SP2 (32 bit), Windows Server 2012 R2.
If you use the virtual machines provided, please find the password of the virtual machines in the header of the table under their names. (Please note that in the virtual machines we use the US International English keyboard layout, so @ is Shift 2.)
Virtual machines (OVA files) | |||||||
---|---|---|---|---|---|---|---|
Attacker 2k8 |
DC 2k8 |
Server 2k8 |
Attacker 2k12 |
DC 2k12 |
Server 2k12 |
Ubuntu 12.04 LTS |
|
Password1 | P@ssw0rd | P@ssw0rd | Password1 | P@ssw0rd | P@ssw0rd | Password1 | |
Course name | 4.8GB | 3.9GB | 3.5GB | 6.7GB | 8.7GB | 4.9GB | 2.3GB |
Advanced Metasploit* | X | X | |||||
Computer forensics | X | ||||||
Deep dive into exploit writing* | X | ||||||
Local & Remote File Inclusion | X | ||||||
Malware analysis* | X | ||||||
Mastering SQL injection | X | X | |||||
Port scanning in depth | X | X | X | ||||
The secret life of Trojans | X |
Some advice on opening the virtual machines
The recommended virtualization software to run the virtual machines is VirtualBox, but they should work with VMware Player as well.
You can download VirtualBox from here.
If you need help to open the virtual machine in VirtualBox, follow the steps in the Lab setup preparation guide.
If you prefer Vmware Payer, you can download the trial version from here.
If you have problems with starting any of virtual machines in VMware Player, try the following things:
- Start it in safe mode first, then restart it normally.
- Install the VMware Tools.
- If the installation of VMware Tools is disabled in the menu, make sure that in the Options section of the virtual machines settings Windows Server 2008 or Windows Server 2012 is set (depends on the machine you are trying).
External downloads
For your course you will need the following free tools as well. You can download them from their official sites by using the links in the header.
External downloads | |||
---|---|---|---|
Course name | Kali Linux | REMnux | |
Advanced Metasploit | |||
Computer forensics | X | ||
Deep dive into exploit writing | X | ||
Local & Remote File Inclusion | X | ||
Malware analysis | |||
Mastering SQL injection | X | ||
Port scanning in depth | |||
The secret life of Trojans | X |
Need help?
Ask, or help the others!