Attacking CUPS - Step by Step

1 month ago
4

Chances are you have a CUPS service running on at least one of your machines. And you may not be aware of the recently disclosed exploits that can gain an attacker remote code execution privileges.

I believe the best way to protect your systems is to understand exploits inside and out... how can you protect a system if you don't know what needs protecting! This is a step by step guide to what can go wrong if you leave those CUPS services unattended.

Loading 2 comments...