This tutorial describes the basic principles of gathering information to exploit a vulnerable Ubuntu machine and outlines many of the security flaws on the OS.
Get the Free Newsletter!
Subscribe to Developer Insider for top news, trends, & analysis