2Much was made for pen-testing practice. When I worked on it, it hit me; Wouldn't be great to have an extra vulnerability on the host itself? As an extra bonus? It is at medium level difficulty. Enumeration is the key.
Built and tested on VMWare ESXi and Fusion.
Need any hints? Feel free to contact me on Twitter: @4nqr34z