Certificate of completion, 18 CPE credits
Course is self-paced
Course archive
The courses below were all published in 2015 or earlier. While we stand by pubishing them then, we’ve grown so much since. We recognize that these workshops don’t exactly meet our standards, as we understand them today.
All classes are available within our premium membership, and have adjusted CPE awards to reflect their respective contents. If you join, please keep in mind that some of the information inside might be outdated or not relevant. We’ll be adding notes at the beginning of each course to let you know what’s worth checking out in each!
The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription
Advanced Exploitation and Exploit Writing with Exploit Pack
This course will cover the following topics from a technical and practical perspective, starting from running and exploiting your first targets to gaining persistence and owning a whole network. This course builds deep background knowledge and expert-level skills and the ideal attendants will be penetration testers, security enthusiasts and network administrators.
Our instructor Juan Sacco has prepared a special gift. Every student who will successfully finish the course will receive a Professional Pack - This pack contains all the exploits you could find out there, this is a full set of 34000+ exploits and by using it you can be sure that your pentest will be come unstoppable. All the platform includeds: Windows, Linux, Unix, Minix, SCO, Solaris, OSX, etc. and even mobile and web attacks.
To receive Professional Pack, send me a message with your certificate code.
Email address: [email protected]
Course format:
- The course is self-paced – you can visit the training whenever you want and your content will be there.
- Once you’re in, you keep access forever, even when you finish the course.
- There are no deadlines, except for the ones you set for yourself.
- Your time will be filled with reading, videos, and exercises.
Topics covered:
- Concepts and basics
- Attacker Decision Making
- Getting started with Exploit Pack and Setup
- Internals of Exploit Pack
- Enumeration of Targets
- Exploiting the LAN
- Exploiting Windows Hosts
- Exploiting Linux Hosts
- Exploiting Web Servers
- Basic Exploit Writing
- Advanced technics and real world examples
- Post Exploitation
Student requirements:
- Basic understanding of Exploit development
- TCP/IP basics
- Network configuration in Windows and Linux/OSX
About Exploit Pack:
Exploit Pack uses an advanced software-defined interface that supports rapid reconfiguration to adapt exploit codes to the constantly evolving threat environment. Our technologies allow you to rapidly tests and defend against hostile remote targets.
The mission of Exploit Pack is to process and exploit security issues, gain access and report incidents in a technical report to help defend against hostile systems.
About the instructor:
Juan Sacco:
Author of the Exploit Pack.
Exploit Writer and Reverse Engineer, worked at Core Security, NOD32, Homeland Security (ARG) and others security related organizations.
Black Hat Europe – Exploit Pack HITB ( Hack in The Box ) - Exploit Writing 64 Bits Black Hat – Exploit Pack tool UTN - Exploit Development Palermo University - Rootkit development UBA University - OpenBSD hardening OpenBSD day - BSD Kernel debugging SecureRoot - Exploit Development
OSX Xcode-select 2.1.1 Buffer Overflow - EChat Server 2.5 Buffer Overflow - EA Sports Persistent Web Vulnerability ( FIFA ) - xMatters AlarmPoint APClient 3.2.0 Heap Buffer Overflow - xMatters AlarmPoint APClient version 3.2.0 heap buffer overflow - xMatters AlarmPoint Java Web Server API 3.2.1 SQLi - Easy Server 3.1 Buffer Overflow - Mercadolibre Persistent Web Vulnerability - BitchX 1.x IRC Client Buffer Overflow - Blender 2.0x Remote Code Execution - Microsoft Reporting tool Buffer Overflow - CDRipper 2.x Buffer Overflow - IRSSI Client 0.6x Remove Code Execution - VCDGEAR – Buffer overflow - MP3Info – Stack based buffer overflow - Perfectview CRM – Stored XSS and SQLi - Mobile IRON – XSS and SMTP Bypass
QUESTIONS?
If you have any questions, please contact our eLearning Manager at [email protected].
Good overview but needs more substance
Would have liked to see Exploit Pack in more real world action to understand the various features, see how they work and get more demo experience.
Good overall for setting up the framework and learning it at a basic level
This is a good video series for learning the basic setup of Exploit Pack. However, some of the commands for setting it up are a little bit incorrect with missing ( –) 2 dashes instead of 1. Didn’t cover much with the in and out of the software but provides you with enough to teach the rest of it to yourself. Plus getting the professional pack of exploits is just an added bonus!! Great work Hakin9!
First class, hands down!
You can’t expect anything lesser than the first class training from the first class exploit dev (ex Core Impact). EP is one of a kind, must have for any serious pen tester/hacker out there….