Common Vulnerabilities Exploitable by Python

This course explores common vulnerabilities and vulnerability exploitation in Python.

6 videos  //  140 minutes of training

Free training week — 1,400+ on-demand courses and hands-on labs

Course description

In this course, we demonstrate how to use Python for exploit development. This is a very in-depth and technical beginner’s tutorial on buffer overflows: the inner workings of a CPU, machine code, Python and using a debugger to make it happen.

Course syllabus

Introduction to buffer overflows (Python Pentesters)Duration: 3:53

What buffer overflows are and how they work.

How to use Python to exploit a buffer overflow vulnerabilityDuration: 62:6

This course will expose you to assembly code and debugging.

SetupDuration: 3:40

Check if your setup is correct.

How to detect a buffer overflowDuration: 33:48

Learn how to detect a buffer overflow.

Hands-on exploitation of EternalBlueDuration: 6:26

Using Python on EternalBlue, one of the most notorious exploits.

Technical review of the EternalBlue exploitDuration: 30:03

Explore the technical review of the EternalBlue exploit.

Meet the author

Chris Bingham

LinkedIn

Chris Bingham is an autodidact, life-long learner, ethical hacker and founder of two cybersecurity organizations: InfoSec GSO and BSides Triad. Along with his colleagues, he leads hands-on offensive security style workshops and training.

His experience and skills range from Linux, Windows and Mac operating systems to buffer overflow development, Burp Suite, and hacking Windows Domain Controller and Active Directory. Chris hopes you enjoy taking his courses as much as he enjoyed making them.

Plans & pricing

Infosec Skills Personal

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

Book a Meeting
  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training that you can trust

IDC MarketScape Leader: U.S. IT Training

IDC MarketScape Leader: U.S. IT Training

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec