• LOGIN
    • No products in the cart.

SELF-PACED, ON DEMAND, 18 CPE CREDITS Advanced Exploitation and Exploit Writing with Exploit Pack.

 The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription


Advanced Exploitation and Exploit Writing with Exploit Pack

This course will cover the following topics from a technical and practical perspective, starting from running and exploiting your first targets to gaining persistence and owning a whole network. This course builds deep background knowledge and expert-level skills and the ideal attendants will be penetration testers, security enthusiasts and network administrators.

THIS COURSE IS SELF-PACED, COMPLETION GRANTS 18 CPE POINTS. 


Our instructor Juan Sacco has prepared a special gift. Every student who will successfully finish the course will receive a Professional PackThis pack contains all the exploits you could find out there, this is a full set of 34000+ exploits and by using it you can be sure that your pentest will be come unstoppable. All the platform includeds: Windows, Linux, Unix, Minix, SCO, Solaris, OSX, etc. and even mobile and web attacks. 


To receive Professional Pack, send me a message with your certificate code. 

Email address: sienicka.marta@hakin9.org 

 


Course format


  • The course is self-paced – you can visit the training whenever you want and your content will be there.


  • Once you’re in, you keep access forever, even when you finish the course. 


  • There are no deadlines, except for the ones you set for yourself. 


  • Your time will be filled with reading, videos, and exercises. 



Topics covered:

  • Concepts and basics

  • Attacker Decision Making

  • Getting started with Exploit Pack and Setup

  • Internals of Exploit Pack

  • Enumeration of Targets

  • Exploiting the LAN

  • Exploiting Windows Hosts

  • Exploiting Linux Hosts

  • Exploiting Web Servers

  • Basic Exploit Writing

  • Advanced technics and real world examples

  • Post Exploitation


Student requirements:

  • Basic understanding of Exploit development

  • TCP/IP basics

  • Network configuration in Windows and Linux/OSX


About Exploit Pack:

logodesignExploit Pack uses an advanced software-defined interface that supports rapid reconfiguration to adapt exploit codes to the constantly evolving threat environment. Our technologies allow you to rapidly tests and defend against hostile remote targets.

The mission of Exploit Pack is to process and exploit security issues, gain access and report incidents in a technical report to help defend against hostile systems.


About the instructor:

Juan Sacco

Juan Sacco: 

Author of the Exploit Pack.

Exploit Writer and Reverse Engineer, worked at Core Security, NOD32, Homeland Security (ARG) and others security related organizations.

Black Hat Europe – Exploit Pack HITB ( Hack in The Box ) – Exploit Writing 64 Bits Black Hat – Exploit Pack tool UTN – Exploit Development Palermo University – Rootkit development UBA University – OpenBSD hardening OpenBSD day – BSD Kernel debugging SecureRoot – Exploit Development

OSX Xcode-select 2.1.1 Buffer Overflow –  EChat Server 2.5 Buffer Overflow –  EA Sports Persistent Web Vulnerability ( FIFA ) –  xMatters AlarmPoint APClient 3.2.0 Heap Buffer Overflow –  xMatters AlarmPoint APClient version 3.2.0 heap buffer overflow –  xMatters AlarmPoint Java Web Server API 3.2.1 SQLi –  Easy Server 3.1 Buffer Overflow –  Mercadolibre Persistent Web Vulnerability –  BitchX 1.x IRC Client Buffer Overflow –  Blender 2.0x Remote Code Execution –  Microsoft Reporting tool Buffer Overflow –  CDRipper 2.x Buffer Overflow –  IRSSI Client 0.6x Remove Code Execution –  VCDGEAR – Buffer overflow –  MP3Info – Stack based buffer overflow –  Perfectview CRM – Stored XSS and SQLi –  Mobile IRON – XSS and SMTP Bypass


If you have any questions about the course or the syllabus, please contact Marta Sienicka at sienicka.marta@hakin9.org

Course Reviews

4

3 ratings
  • 5 stars1
  • 4 stars1
  • 3 stars1
  • 2 stars0
  • 1 stars0
  1. Profile photo of Wynand Viljoen

    Good overview but needs more substance

    Would have liked to see Exploit Pack in more real world action to understand the various features, see how they work and get more demo experience.

  2. Profile photo of Kevin Randall

    Good overall for setting up the framework and learning it at a basic level

    This is a good video series for learning the basic setup of Exploit Pack. However, some of the commands for setting it up are a little bit incorrect with missing ( –) 2 dashes instead of 1. Didn’t cover much with the in and out of the software but provides you with enough to teach the rest of it to yourself. Plus getting the professional pack of exploits is just an added bonus!! Great work Hakin9!

  3. Profile photo of d3tox

    First class, hands down!

    You can’t expect anything lesser than the first class training from the first class exploit dev (ex Core Impact). EP is one of a kind, must have for any serious pen tester/hacker out there….

TAKE THIS COURSE
  • Membership Access
  • UNLIMITED ACCESS
  • Course Certificate
218 STUDENTS ENROLLED
  • Profile photo of joanna_kretowicz
  • Profile photo of omickymouse
  • Profile photo of shane4842007
  • Profile photo of chandraroyyuru
  • Profile photo of arxerisdam2
  • Profile photo of troubleshooter2012

Who’s Online

Profile picture of joanna_kretowicz
Profile picture of Marta Strzelec

Certificate Code