I'm trying to remember where, but I once saw this article presented with a very nice guide to replicating the exploits in a VM on a modern computer.
I think it must have been in university, unfortunately when I look up the course number, the resources seem to be (understandably, I suppose) date gated.
I think it must have been in university, unfortunately when I look up the course number, the resources seem to be (understandably, I suppose) date gated.