Course
Common Vulnerabilities Exploitable by Python
This course explores common vulnerabilities and vulnerability exploitation in Python.
Course description
In this course, we demonstrate how to use Python for exploit development. This is a very in-depth and technical beginner’s tutorial on buffer overflows: the inner workings of a CPU, machine code, Python and using a debugger to make it happen.
Syllabus
Resources
File - 00:10:00
Files you will need for this course.
How to Detect a Buffer Overflow
Video - 00:34:00
Setup
Video - 00:04:00
Technical Review of the EternalBlue Exploit
Video - 00:30:00
Hands-on Exploitation of EternalBlue
Video - 00:06:00
Using Python on EternalBlue, one of the most notorious exploits.
How to use Python to Exploit a Buffer Overflow Vulnerability
Video - 01:02:00
This course will expose you to assembly code and debugging.
Introduction to Buffer Overflows
Video - 00:04:00
What buffer overflows are and how they work.
Unlock 7 days of free training
- 1,400+ hands-on courses and labs
- Certification practice exams
- Skill assessments
Associated NICE Work Roles
All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.
- All-Source Analyst
- Mission Assessment Specialist
- Exploitation Analyst
Plans & pricing
Infosec Skills Personal
$299 / year
- 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Custom certification practice exams (e.g., CISSP, Security+)
- Skill assessments
- Infosec peer community support
Infosec Skills Teams
$799 per license / year
- Team administration and reporting
- Dedicated client success manager
-
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
-
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps
Award-winning training you can trust




