How do Worms travel?
A vulnerability with the catchy name of MS08-067 was used by Stuxnet and Conficker to worm themselves across Local Area Networks but how did it work? I spent a reasonable amount of time reverse engineering the vulnerability to discover how it was exploited.