Writeup of live machine

I believe I know which site you are talking about, however if we are talking about the same thing they only used the box as an example for using the exploit. If they had built their own VM the steps would have been the exact same. Its not so much of a writeup as a walkthrough of using that specific exploit.