IT security attacking virtual machine Project

 

Instructions

the VM will be provided after assigning the project to someone.

You have ti provide an exploit and a snort signature for this project. 

Tags: No tags