• No products in the cart.

NeXpose and Metasploit Hacking – Workshop eBook

Nexpose and Metasploit.pdf

Dear Readers,

We would like to proudly present you the newest Hakin9 workshop issue. We hope that you will learn interesting techniques and tools from this e-book. In this e-book you will find materials presented in the course “Hack with NeXpose and Metasploit Pro & Perform Penetration Testing of Your Organization”.

Note: In this issue the final quiz is not presented. If you would like to gain access to it and receive a certificate, you have to buy the course. 

The main aim of this e-book is to present our reading materials from our online courses to a wider range of readers. We hope we can meet your expectations. We would also want to thank you for all your support. We appreciate it a lot. If you like this publication you can share it and tell your friends about it! every comment means a lot to us. Again special thanks to the Proofreader who helped with this issue.

Enjoy your reading,

Hakin9 Magazine’s

Editorial Team

This e-book contains text materials from the course.

If you are not a subscriber and want to buy this magazine click here

>>Download Preview <<

>>Table of Contents<<

Module 1 

  • NeXpose Exposed

    • NeXpose Editions

    • NeXpose Components

    • Vulnerability Assessment & NeXpose

    • Vulnerability Reporting and NeXpose

Module 2 

  • Metasploit Pro Professional Use

    • Metasploit Architecture’s Basics

    • Metasploit Commands 

    •  Metasploit Professional Use

Module 3 

  • NeXpose and Metasploit Lab

    • Lab

    • Kali Linux 

    • Setup Your NeXpose and Metasploit Box

    • Setting up Metasploit Console for other functionalities

Module 4

  • Hacking with NeXpose and Metasploit

    • Hacking Methodology

    • Ports and Services Scanning

    • Information Gathering

      Metasploit Console

    • NeXpose Scan from Metasploit Console

    • NeXpose Connection

    • Hacking Linux Machine

If you are not a subscriber and want to buy this magazine click here


In this online course, you will learn more about NeXpose and Metasploit features, their usage and how you can best utilize these tools in order to perform penetration testing or security assessment of your organization.

VISIT COURSE>>> Syllabus 

Nexpose and Metasploit.pdf

August 24, 2016

Leave a Reply


This site uses Akismet to reduce spam. Learn how your comment data is processed.

Notify of

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013