Archive for May, 2012
Malicious VM to Host Attacks
Posted by scriptjunkie in Exploits, Vulnerabilities on May 6, 2012
In The Hacker Games, a hostile VM is used as the target. It employs a few counterattacks among the included CTF-style challenges, so if you don’t want any spoilers, don’t keep reading!