• LOGIN
  • No products in the cart.

NeXpose and Metasploit Hacking – Workshop eBook

Download
File
Nexpose and Metasploit.pdf

Dear Readers,

We would like to proudly present you the newest Hakin9 workshop issue. We hope that you will learn interesting techniques and tools from this e-book. In this e-book you will find materials presented in the course “Hack with NeXpose and Metasploit Pro & Perform Penetration Testing of Your Organization”.

Note: In this issue the final quiz is not presented. If you would like to gain access to it and receive a certificate, you have to buy the course. 

The main aim of this e-book is to present our reading materials from our online courses to a wider range of readers. We hope we can meet your expectations. We would also want to thank you for all your support. We appreciate it a lot. If you like this publication you can share it and tell your friends about it! every comment means a lot to us. Again special thanks to the Proofreader who helped with this issue.

Enjoy your reading,

Hakin9 Magazine’s

Editorial Team

This e-book contains text materials from the course.

If you are not a subscriber and want to buy this magazine click here


>>Download Preview <<


>>Table of Contents<<


Module 1 

  • NeXpose Exposed

    • NeXpose Editions


    • NeXpose Components


    • Vulnerability Assessment & NeXpose


    • Vulnerability Reporting and NeXpose




Module 2 

  • Metasploit Pro Professional Use

    • Metasploit Architecture’s Basics


    • Metasploit Commands 


    •  Metasploit Professional Use




Module 3 

  • NeXpose and Metasploit Lab

    • Lab


    • Kali Linux 


    • Setup Your NeXpose and Metasploit Box


    • Setting up Metasploit Console for other functionalities




Module 4

  • Hacking with NeXpose and Metasploit

    • Hacking Methodology


    • Ports and Services Scanning


    • Information Gathering

      Metasploit Console


    • NeXpose Scan from Metasploit Console


    • NeXpose Connection


    • Hacking Linux Machine




If you are not a subscriber and want to buy this magazine click here


COURSE DESCRIPTION:

In this online course, you will learn more about NeXpose and Metasploit features, their usage and how you can best utilize these tools in order to perform penetration testing or security assessment of your organization.

VISIT COURSE>>> Syllabus 


Download
File
Nexpose and Metasploit.pdf

August 24, 2016

Leave a Reply

Be the First to Comment!

Notify of
avatar
wpDiscuz