Antisyphon Training & Black Hills Information Security are collaborating on a webinar! 🎉💻

Hey folks! 👋

🔓 Exploit-db contains many different forms of software vulnerability exploits.

🔍 These various software exploits are documented as anything from simple command line entities through proof of concept (POC) scripts written in languages like C, C++, C#, Ruby, Python, and UNIX shell scripts.

🎥 In this webcast, @yoda will break down the Python language components of an exploit documented in CVE-2019-13577, targeting the Maple Computer WBT SNMP Administrator version 2.0.195.15. 🐍💥

Thursday, May 25th - 1:00 PM ET

Register: https://zoom.us/webinar/register/WN_d-GI7v7bQriRu_O-mi7kcg#/registration

He will discuss the required Python language components, modules, and porting of the exploit from Python2 to Python3.

If none of that made any sense to you, then this might be the perfect webcast to start learning these things.

Joff is also teaching another run of his "Introduction to Python" course in June! Find out more & register here: https://cvent.me/4brYMg?RefId=WB525_MD

Chat with your fellow attendees in the Antisyphon Discord server ➡️: https://discord.com/invite/antisyphon

Show up early for the pre-show!

John Strand & Joff Thyer -

Welcome! You are invited to join a webinar: Anatomy of a Python Scripted Remote Buffer Overflow w/ Joff Thyer | 1-Hour. After registering, you will receive a confirmation email about joining the webinar.

Exploit-db.com contains many different forms of software vulnerability exploits. These various software exploits are documented as anything from simple command line entities through proof of concept (POC) scripts written in languages like C, C++, C#, Ruby, Python and UNIX shell scripts.  In this webcast, Joff will break down the Python language components of an exploit documented in CVE-2019-13577, targeting the Maple Computer WBT SNMP Administrator version 2.0.195.15.  He will discuss the required Python language components, modules, and porting of the exploit from Python2 to Python3.  Chat with your fellow attendees in the Black Hills Infosec Discord server here: https://discord.gg/BHIS -- in the #webcast-live-chat channel.

Zoom