Attacking CUPS - Step by Step

1 day ago
1

Chances are you have a CUPS service running on at least one of your machines. And you may not be aware of the recently disclosed exploits that can gain an attacker remote code execution privileges.

I believe the best way to protect your systems is to understand exploits inside and out... how can you protect a system if you don't know what needs protecting! This is a step by step guide to what can go wrong if you leave those CUPS services unattended.

Loading 1 comment...