Skip to content

Commit

Permalink
✏️ docs: Fix path to redis payload in crlf-injection docs
Browse files Browse the repository at this point in the history
  • Loading branch information
olivier97 committed Nov 7, 2023
1 parent f98d59a commit b6108e8
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion exploit-toolkit/exploits/crlf-injection/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@ Next, send your payload. Make sure to specify the Redis instance that is reachab
Within Docker or K8s, this should be `unguard-redis:6379`.

```shell
$ ug-exploit redis --redis-host unguard-redis:6379 ./exploits/crlf-injection/payload/hackedflag
$ ug-exploit redis --redis-host unguard-redis:6379 ./exploits/crlf-injection/payload/hackedflag.txt
```

You can use any Redis client to verify that the exploit has worked. For convenience, you can SSH into the redis pod and
Expand Down

0 comments on commit b6108e8

Please sign in to comment.