Don't forget our Black Hills Information/Antisyphon Training webcast today 1 p.m. ET! Still time to register: https://zoom.us/webinar/register/WN_d-GI7v7bQriRu_O-mi7kcg#/registration
Join in at 12:30 p.m. ET for PreShow Banter™
Join @yoda June 13-16 for his class, “Introduction to Python.” Details and reg here: https://cvent.me/4brYMg?RefId=WB525_MD
Join in at 12:30 p.m. ET for PreShow Banter™
Join @yoda June 13-16 for his class, “Introduction to Python.” Details and reg here: https://cvent.me/4brYMg?RefId=WB525_MD
Welcome! You are invited to join a webinar: Anatomy of a Python Scripted Remote Buffer Overflow w/ Joff Thyer | 1-Hour. After registering, you will receive a confirmation email about joining the webinar.
Exploit-db.com contains many different forms of software vulnerability exploits. These various software exploits are documented as anything from simple command line entities through proof of concept (POC) scripts written in languages like C, C++, C#, Ruby, Python and UNIX shell scripts. In this webcast, Joff will break down the Python language components of an exploit documented in CVE-2019-13577, targeting the Maple Computer WBT SNMP Administrator version 2.0.195.15. He will discuss the required Python language components, modules, and porting of the exploit from Python2 to Python3. Chat with your fellow attendees in the Black Hills Infosec Discord server here: https://discord.gg/BHIS -- in the #webcast-live-chat channel.