Course archive

The courses below were all published in 2015 or earlier. While we stand by pubishing them then, we’ve grown so much since. We recognize that these workshops don’t exactly meet our standards, as we understand them today. 

All classes are available within our premium membership, and have adjusted CPE awards to reflect their respective contents. If you join, please keep in mind that some of the information inside might be outdated or not relevant. We’ll be adding notes at the beginning of each course to let you know what’s worth checking out in each! 

The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription

It is high time to learn what you can do knowing the Metasploit Framework. In this course Abdelli will guide you through the installation process on different platforms (Linux, Windows, and Mac OS X), the you will learn how to set up your Own Pen-Testing Lab.

Abdelli will guide you step by step how to create your own Lab which consists of 2 Virtual-Box machines, however you can expand it as much as you like once you get the idea. In the next part you will learn all about main payload types available for Metasploit framework. These include VNC injectionfile execution, an interactive shellcommand executionDLL injectionadding a user and the Meterpreter. However, not all payload types are available on every operating system.

When you have a basic knowledge on how to generate payloads and how to use them, we will tell you how can they help with in exploiting remote hosts?  And it is time to learn more about  exploiting the software & evading the antivirus. Then, you will gain the next superpower: What is Armitage and how to install and configure it to use the MSF databaseHow to scan and exploit hosts using Armitage GUI.  

In this course you will learn how to use an already exploited host as a pivot and get access to other hosts on the same network. Finally, Metasploit provides modules for Post Exploitation activities for a variety of systems. In this section, we will examine how we can use Metasploit to perform Post Exploitation. And now, we are ready to begin writing the report of all hosts we compromised and the existing vulnerabilities. Also, we can make our report more rich with some confidential files, that way we inform the client that the weakest point is the “Customer service” and from there we were able to gain access to all internal machines.


ABDELLI Nassereddine is a professional penetration tester, he specializes in web application security but he also has a very strong knowledge on other forms of penetration testing including networks. He does security researches in his spear time as he always has something in mind to work on. He also worked for several companies like Sucuri inc, Nethemba s.r.o and Defencely.  

He can be contacted at pinasro[at]gmail[dot]com or via Linkedin at  

Certificate of completion, no CPE credits

Course format

    • The course is self-paced – you can visit the training whenever you want and your content will be there.
    • Once you’re in, you keep access forever, even when you finish the course. 
    • There are no deadlines, except for the ones you set for yourself. 



    • Preparation and Requirements
    • Linux (Ubuntu)
    • Windows
    • Mac OSX


    • Setting up your Own Pen-Testing Lab

    • Installing Metasploitable on Virtual-Box
    • Installing Windows XP on Virtual-Box
    • Client-side attacks

Module 3: ARMITAGE

    • Installation (Mac OSX, Linux)

    • Utilization of Armitage
    • Scanning and Exploitation
    • Pivoting


    • What is Post-Exploitation?

    • Pass The Hash (PTH)
    • Penetration Testing Scenarios


If you have any questions, please contact our eLearning Manager at [email protected].

Course Reviews


1 ratings
  • 5 stars0
  • 4 stars1
  • 3 stars0
  • 2 stars0
  • 1 stars0
  1. anushka chhoker


    very good course! I have learn a lot from this

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.