Attacking and Defending a Linux System | BeyondTrust