Virtual Machine Cyber Risk Assessment

This document was written as a risk assessment of our virtual machines. In the document you can find instructions on how the exploit found and how they are ran. You can also find graphics and a breakdown of the entire process.