Is it a good or bad idea to put this to Nr. 1 or 2 of all countermeasures? Is it a good idea to put Social Engineering and Phishing to Nr. 1 or 2 of all threats? In this article I will question this dogma!
This wargame gives an introduction of various weaknesses in Linux and scripting. The difference to other writeups is, that I I'll explain the given problems and show how to fix that kind of issue or avoid it in the first place. Of course I'll give an exploit too.