Within a virtual environment, participants will walk through the steps that an attacker would
use to exploit the bash bug vulnerability, using popular assessment tools including Burpsuite.
Afterwards, participants will remediate vulnerabilities and verify that the attack is no longer
possible.