The Hacker

Ethical Hacking · Cybersecurity · Penetration Testing

Ethical Use Only. This guide covers cybersecurity concepts for educational purposes — penetration testing with authorisation, CTF competitions, security research, and building defensive skills. Always obtain written permission before testing any system you do not own. Unauthorised access to computer systems is illegal under laws such as the Computer Fraud and Abuse Act (CFAA) and the Computer Misuse Act.
Foundations
Offensive Techniques
Defensive Security
Specialist Domains
Learning Path
Practice Platforms
PlatformStyleBest ForCost
TryHackMeGuided learning pathsAbsolute beginners, structured labsFree / £10/mo
HackTheBoxReal-world machinesIntermediate–advanced hands-on hackingFree / €14/mo
PicoCTFCTF competitionsStudents, beginner–intermediate CTFFree
OverTheWireWargames (CLI)Linux skills, binary exploitation basicsFree
VulnHubDownloadable VMsOffline practice, OSCP prepFree
DVWASelf-hosted web appWeb application testing practiceFree
Root MeChallengesWide range of categories, no subscriptionFree
CTFtimeCTF event trackerFinding live competitionsFree
Legal Lab Setup
SetupHowUse
Virtual MachinesVirtualBox or VMware + Kali Linux ISOIsolated attack environment — safe to break things
MetasploitableVulnerable VM by Rapid7Practice exploitation against intentionally weak target
FLARE VMWindows-based analysis VM by MandiantMalware analysis and reverse engineering
Docker labsdocker pull vulnerables/web-dvwaQuick spin-up of vulnerable web apps locally
Home network segmentSeparate VLAN / router for lab devicesHardware device testing without risking main network