Exploit Pack Training (W25)


37 items sold

Out of stock

The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription

This course will cover the following topics from a technical and practical perspective, starting from running and exploiting your first targets to gaining persistence and owning a whole network. This course builds deep background knowledge and expert-level skills and the ideal attendants will be penetration testers, security enthusiasts and network administrators.


Our instructor Juan Sacco has prepared a special gift. Every student who will successfully finish the course will receive a Professional Pack - This pack contains all the exploits you could find out there, this is a full set of 34000+ exploits and by using it you can be sure that your pentest will be come unstoppable. All the platform includeds: Windows, Linux, Unix, Minix, SCO, Solaris, OSX, etc. and even mobile and web attacks. 

To receive Professional Pack, send me a message with your certificate code.

Email address: [email protected]

Course format

    • The course is self-paced – you can visit the training whenever you want and your content will be there.

    • Once you’re in, you keep access forever, even when you finish the course.

    • There are no deadlines, except for the ones you set for yourself.

    • Your time will be filled with reading, videos, and exercises.

Topics covered:

    • Concepts and basics

    • Attacker Decision Making

    • Getting started with Exploit Pack and Setup

    • Internals of Exploit Pack

    • Enumeration of Targets

    • Exploiting the LAN

    • Exploiting Windows Hosts

    • Exploiting Linux Hosts

    • Exploiting Web Servers

    • Basic Exploit Writing

    • Advanced technics and real world examples

    • Post Exploitation

Student requirements:

    • Basic understanding of Exploit development

    • TCP/IP basics

    • Network configuration in Windows and Linux/OSX

About Exploit Pack:

logodesignExploit Pack uses an advanced software-defined interface that supports rapid reconfiguration to adapt exploit codes to the constantly evolving threat environment. Our technologies allow you to rapidly tests and defend against hostile remote targets.

The mission of Exploit Pack is to process and exploit security issues, gain access and report incidents in a technical report to help defend against hostile systems.

About the instructor:

Juan Sacco

Juan Sacco: 

Author of the Exploit Pack.

Exploit Writer and Reverse Engineer, worked at Core Security, NOD32, Homeland Security (ARG) and others security related organizations.

Black Hat Europe – Exploit Pack HITB ( Hack in The Box ) - Exploit Writing 64 Bits Black Hat – Exploit Pack tool UTN - Exploit Development Palermo University - Rootkit development UBA University - OpenBSD hardening OpenBSD day - BSD Kernel debugging SecureRoot - Exploit Development

OSX Xcode-select 2.1.1 Buffer Overflow -  EChat Server 2.5 Buffer Overflow -  EA Sports Persistent Web Vulnerability ( FIFA ) -  xMatters AlarmPoint APClient 3.2.0 Heap Buffer Overflow -  xMatters AlarmPoint APClient version 3.2.0 heap buffer overflow -  xMatters AlarmPoint Java Web Server API 3.2.1 SQLi -  Easy Server 3.1 Buffer Overflow -  Mercadolibre Persistent Web Vulnerability -  BitchX 1.x IRC Client Buffer Overflow -  Blender 2.0x Remote Code Execution -  Microsoft Reporting tool Buffer Overflow -  CDRipper 2.x Buffer Overflow -  IRSSI Client 0.6x Remove Code Execution -  VCDGEAR – Buffer overflow -  MP3Info – Stack based buffer overflow -  Perfectview CRM – Stored XSS and SQLi -  Mobile IRON – XSS and SMTP Bypass

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013