Register now for our upcoming December Secure Code Summit! Register Here
Shopping Cart

No products in the cart.

Antisyphon Training & Black Hills Information Security joint webcast!

Anatomy of a Python Scripted Remote Buffer Overflow Graphic

Antisyphon Training & Black Hills Information Security are collaborating on a webinar!

Hey folks!

Exploit-db contains many different forms of software vulnerability exploits.

These various software exploits are documented as anything from simple command line entities through proof of concept (POC) scripts written in languages like C, C++, C#, Ruby, Python, and UNIX shell scripts.In this webcast, Joff Thyer will break down the Python language components of an exploit documented in CVE-2019-13577, targeting the Maple Computer WBT SNMP Administrator version 2.0.195.15.

He will discuss the required Python language components, modules, and porting of the exploit from Python2 to Python3. If none of that made any sense to you, then this might be the perfect webcast to start learning these things. Join us Thursday, May 25th at 1:00 PM ET and come early for the PreShow Banterâ„¢!

You can also chat with your fellow attendees during the webcast by joining the Antisyphon Discord server: https://discord.com/invite/antisyphon

Register here: https://zoom.us/webinar/register/WN_d-GI7v7bQriRu_O-mi7kcg#/registration

Want to learn more about python? Joff is teaching another run of his “Introduction to Python” course in June! Find out more & register here: https://www.antisyphontraining.com/introduction-to-python/

John Strand & Joff Thyer –

Related Courses