Learn the answer to this question and more in Nathan Sweaney's upcoming Pay-What-You-Can class, “PCI 101,” on June 6! Details and registration: https://cvent.me/KnXMoB?RefId=Q%3F_MD
Exploit-db.com contains many different forms of software vulnerability exploits. These various software exploits are documented as anything from simple command line entities through proof of concept (POC) scripts written in languages like C, C++, C#, Ruby, Python and UNIX shell scripts. In this webcast, Joff will break down the Python language components of an exploit documented in CVE-2019-13577, targeting the Maple Computer WBT SNMP Administrator version 2.0.195.15. He will discuss the required Python language components, modules, and porting of the exploit from Python2 to Python3. Chat with your fellow attendees in the Black Hills Infosec Discord server here: https://discord.gg/BHIS -- in the #webcast-live-chat channel.
This father/son duo wants to believe... that you will be at Deadwood 2023! Please welcome Ray Felch and @ustayready as two more of our phenomenal speakers at this year's con!
Pre-con training seats are limited, so be sure to grab those tickets! → https://cvent.me/AMQlAL?RefId=MD
Here's a past livestream with Chris Brenton where he shows how to go through PCAP files with Zeek. https://www.youtube.com/watch?v=Jd80NfBVAcU
Join Chris June 6-9 for his Pay-What-You-Can class, "Getting Started in Packet Decoding"! Details and registration here: https://cvent.me/D0Dlmg?RefId=ANTI009_MD
Antisyphon Training & Black Hills Information Security are collaborating on a webinar! 🎉💻
Hey folks! 👋
🔓 Exploit-db contains many different forms of software vulnerability exploits.
🔍 These various software exploits are documented as anything from simple command line entities through proof of concept (POC) scripts written in languages like C, C++, C#, Ruby, Python, and UNIX shell scripts.
🎥 In this webcast, @yoda will break down the Python language components of an exploit documented in CVE-2019-13577, targeting the Maple Computer WBT SNMP Administrator version 2.0.195.15. 🐍💥
Thursday, May 25th - 1:00 PM ET
Register: https://zoom.us/webinar/register/WN_d-GI7v7bQriRu_O-mi7kcg#/registration
He will discuss the required Python language components, modules, and porting of the exploit from Python2 to Python3.
If none of that made any sense to you, then this might be the perfect webcast to start learning these things.
Joff is also teaching another run of his "Introduction to Python" course in June! Find out more & register here: https://cvent.me/4brYMg?RefId=WB525_MD
Chat with your fellow attendees in the Antisyphon Discord server ➡️: https://discord.com/invite/antisyphon
Show up early for the pre-show!
John Strand & Joff Thyer -
Exploit-db.com contains many different forms of software vulnerability exploits. These various software exploits are documented as anything from simple command line entities through proof of concept (POC) scripts written in languages like C, C++, C#, Ruby, Python and UNIX shell scripts. In this webcast, Joff will break down the Python language components of an exploit documented in CVE-2019-13577, targeting the Maple Computer WBT SNMP Administrator version 2.0.195.15. He will discuss the required Python language components, modules, and porting of the exploit from Python2 to Python3. Chat with your fellow attendees in the Black Hills Infosec Discord server here: https://discord.gg/BHIS -- in the #webcast-live-chat channel.