Exploit-db contains many different forms of software vulnerability exploits.
These various software exploits are documented as anything from simple command line entities through proof of concept (POC) scripts written in languages like C, C++, C#, Ruby, Python, and UNIX shell scripts.In this webcast, Joff Thyer will break down the Python language components of an exploit documented in CVE-2019-13577, targeting the Maple Computer WBT SNMP Administrator version 220.127.116.11.
He will discuss the required Python language components, modules, and porting of the exploit from Python2 to Python3. If none of that made any sense to you, then this might be the perfect webcast to start learning these things. Join us Thursday, May 25th at 1:00 PM ET and come early for the PreShow Banter™!
You can also chat with your fellow attendees during the webcast by joining the Antisyphon Discord server: https://discord.com/invite/antisyphon
Want to learn more about python? Joff is teaching another run of his “Introduction to Python” course in June! Find out more & register here: https://www.antisyphontraining.com/introduction-to-python/