Penetration Testing Crash Course

4 sections

5 challenges

Want to know what it’s like to hack into computers?

In this crash course, we’ll take you from 0 to exploiting a machine in about 20 minutes! (It’s free for subscribers and course buyers!) We’ll guide you from discovery, enumeration, to exploitation.

Ready to start?

Real software vulns

Gain root privileges via an FTP vuln

What’s inside?

Introduction

Learn the terms and methodology you need to perform an attack.

Scanning the target!

Learn about scanning machines and your future best friend nmap.

Enumeration

How do we use what we learned about our target to discover and determine potential weaknesses?

Exploitation

With the enumeration work done, you’re ready to attack our target!

free while subscribed
£0
subscribe for £20/mo

Why we’re worth it

When I learned cybersecurity, I was fed false promises to make me an expert in one course for £40. It doesn’t work.

The end result: I could name-drop 20 more vulns, how they work, maybe 1–2 more automated tools.

Here’s the problem: the moment I loaded a client’s website to do penetration testing, I was slapped with “no automated tools please” — so that’s out. I came to realize that a shallow understanding with no substance of mastery ≠ real cybersec work.

Why not learn the right way, the first time, efficiently? That’s why I created Dev Aviary to help students like you get to real pentesting, real bug bounties. Faster, too. Because you skip the time other courses waste.

When you learn with Dev Aviary, I will personally support you through our course catalogue (it’s small now, but it’s growing!). I hope you enjoy learning with us :)

Nina, co-founder

Questions?

Before you start

  • You’ll need a general tech background, meaning a little scripting/programming experience, a general understanding of the web, and so on.

This course is for you if...

  • You are new to cybersecurity and not sure where to start.
  • You prefer to learn cybersecurity with hands-on labs rather than just reading or watching videos.

As a starter course, you’ll get the big picture of what hacking can look like. If you want to learn cybersecurity in greater depth, check out our other courses (more courses coming!).

See more courses

FAQs.

Kali machine
What are the specs for my Kali Linux virtual machine?

Internet is disabled, CPU is limited to 1.5 units and RAM is limited to 2G. But other than that, you have access to your machine 24/7.

Will my data (my files, scripts etc) be persisted in my Kali machine?

Store all your scripts & data in ~/nest as this folder (and nothing else!) will be persisted across restarts & updates.

All your servers are too far from me and my machine is laggy. Can you set one up near me?

Of course! Let us know where you’d like your lab to be hosted and we’d happily create a new server near it.

We’re also already working on making servers in the US available.

How long do I get access to the machine?

Subscribers get access for as long as you’re subscribed. If you’ve purchased a course, then you always have access to it.

Can I request additional tools on my machine?

Of course you can! Please contact us with your requests (see our help centre when logged in).

Are there any minimum requirements to run this?

Since there’s an entire machine in our app, make sure your screen is big enough (1920x1680)!

Account
Can I change the location of my machine & labs any time?

Send us your request via the help center when logged in. This will be automated soon!

What’s the refund policy?

We give refunds if requested within 1 month (i.e. for the current month of subscription, or courses purchased less than a month ago).

Courses
Are there prerequisites to your courses?

As long as you have a general tech background (programmer, IT, computer science student etc), we don’t assume any prior cybersecurity knowledge!

Why do you require a general tech background for your courses?

Being able to break / exploit something comes from knowing it as well as you know your palm. We leave the prerequisite tech background to other people’s capable hands, so that we can focus on teaching you how to break the tech.