Requested resource is not accessible

Certificate of completion, 18 CPE credits

Course is self-paced


Course archive

The courses below were all published in 2015 or earlier. While we stand by pubishing them then, we’ve grown so much since. We recognize that these workshops don’t exactly meet our standards, as we understand them today. 

All classes are available within our premium membership, and have adjusted CPE awards to reflect their respective contents. If you join, please keep in mind that some of the information inside might be outdated or not relevant. We’ll be adding notes at the beginning of each course to let you know what’s worth checking out in each! 


 The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription


Advanced Exploitation and Exploit Writing with Exploit Pack

This course will cover the following topics from a technical and practical perspective, starting from running and exploiting your first targets to gaining persistence and owning a whole network. This course builds deep background knowledge and expert-level skills and the ideal attendants will be penetration testers, security enthusiasts and network administrators.


Our instructor Juan Sacco has prepared a special gift. Every student who will successfully finish the course will receive a Professional Pack - This pack contains all the exploits you could find out there, this is a full set of 34000+ exploits and by using it you can be sure that your pentest will be come unstoppable. All the platform includeds: Windows, Linux, Unix, Minix, SCO, Solaris, OSX, etc. and even mobile and web attacks. 


To receive Professional Pack, send me a message with your certificate code.

Email address: [email protected]


Course format:

  • The course is self-paced – you can visit the training whenever you want and your content will be there.
  • Once you’re in, you keep access forever, even when you finish the course.
  • There are no deadlines, except for the ones you set for yourself.
  • Your time will be filled with reading, videos, and exercises.

Topics covered:

  • Concepts and basics
  • Attacker Decision Making
  • Getting started with Exploit Pack and Setup
  • Internals of Exploit Pack
  • Enumeration of Targets
  • Exploiting the LAN
  • Exploiting Windows Hosts
  • Exploiting Linux Hosts
  • Exploiting Web Servers
  • Basic Exploit Writing
  • Advanced technics and real world examples
  • Post Exploitation

Student requirements:

  • Basic understanding of Exploit development
  • TCP/IP basics
  • Network configuration in Windows and Linux/OSX

About Exploit Pack:

logodesignExploit Pack uses an advanced software-defined interface that supports rapid reconfiguration to adapt exploit codes to the constantly evolving threat environment. Our technologies allow you to rapidly tests and defend against hostile remote targets.

The mission of Exploit Pack is to process and exploit security issues, gain access and report incidents in a technical report to help defend against hostile systems.


About the instructor:

Juan Sacco

Juan Sacco: 

Author of the Exploit Pack.

Exploit Writer and Reverse Engineer, worked at Core Security, NOD32, Homeland Security (ARG) and others security related organizations.

Black Hat Europe – Exploit Pack HITB ( Hack in The Box ) - Exploit Writing 64 Bits Black Hat – Exploit Pack tool UTN - Exploit Development Palermo University - Rootkit development UBA University - OpenBSD hardening OpenBSD day - BSD Kernel debugging SecureRoot - Exploit Development

OSX Xcode-select 2.1.1 Buffer Overflow -  EChat Server 2.5 Buffer Overflow -  EA Sports Persistent Web Vulnerability ( FIFA ) -  xMatters AlarmPoint APClient 3.2.0 Heap Buffer Overflow -  xMatters AlarmPoint APClient version 3.2.0 heap buffer overflow -  xMatters AlarmPoint Java Web Server API 3.2.1 SQLi -  Easy Server 3.1 Buffer Overflow -  Mercadolibre Persistent Web Vulnerability -  BitchX 1.x IRC Client Buffer Overflow -  Blender 2.0x Remote Code Execution -  Microsoft Reporting tool Buffer Overflow -  CDRipper 2.x Buffer Overflow -  IRSSI Client 0.6x Remove Code Execution -  VCDGEAR – Buffer overflow -  MP3Info – Stack based buffer overflow -  Perfectview CRM – Stored XSS and SQLi -  Mobile IRON – XSS and SMTP Bypass


QUESTIONS? 

If you have any questions, please contact our eLearning Manager at [email protected].

Course Reviews

4

4
3 ratings
  • 5 stars1
  • 4 stars1
  • 3 stars1
  • 2 stars0
  • 1 stars0
  1. Good overview but needs more substance

    3

    Would have liked to see Exploit Pack in more real world action to understand the various features, see how they work and get more demo experience.

  2. Good overall for setting up the framework and learning it at a basic level

    4

    This is a good video series for learning the basic setup of Exploit Pack. However, some of the commands for setting it up are a little bit incorrect with missing ( –) 2 dashes instead of 1. Didn’t cover much with the in and out of the software but provides you with enough to teach the rest of it to yourself. Plus getting the professional pack of exploits is just an added bonus!! Great work Hakin9!

  3. First class, hands down!

    5

    You can’t expect anything lesser than the first class training from the first class exploit dev (ex Core Impact). EP is one of a kind, must have for any serious pen tester/hacker out there….

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.