Posted by scriptjunkie in Exploits, Vulnerabilities on May 6, 2012
In The Hacker Games, a hostile VM is used as the target. It employs a few counterattacks among the included CTF-style challenges, so if you don’t want any spoilers, don’t keep reading!
You are currently browsing the archives for May, 2012
Fusion theme by digitalnature | powered by WordPress
Entries (RSS) and Comments (RSS) ^