Skip to content

Commit

Permalink
📝 docs(crlf-injection): Fix path to redis payload file
Browse files Browse the repository at this point in the history
  • Loading branch information
olivier97 committed Nov 8, 2023
1 parent f98d59a commit 300b857
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion exploit-toolkit/exploits/crlf-injection/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@ Next, send your payload. Make sure to specify the Redis instance that is reachab
Within Docker or K8s, this should be `unguard-redis:6379`.

```shell
$ ug-exploit redis --redis-host unguard-redis:6379 ./exploits/crlf-injection/payload/hackedflag
$ ug-exploit redis --redis-host unguard-redis:6379 ./exploits/crlf-injection/payload/hackedflag.txt
```

You can use any Redis client to verify that the exploit has worked. For convenience, you can SSH into the redis pod and
Expand Down

0 comments on commit 300b857

Please sign in to comment.