IT Security Attacking Virtual Machine Project

the VM will be provided after assigning the project to someone.
You have ti provide an exploit and a snort signature for this project.