diff --git a/exploit-toolkit/exploits/crlf-injection/README.md b/exploit-toolkit/exploits/crlf-injection/README.md index d333600d..31357159 100644 --- a/exploit-toolkit/exploits/crlf-injection/README.md +++ b/exploit-toolkit/exploits/crlf-injection/README.md @@ -45,7 +45,7 @@ Next, send your payload. Make sure to specify the Redis instance that is reachab Within Docker or K8s, this should be `unguard-redis:6379`. ```shell -$ ug-exploit redis --redis-host unguard-redis:6379 ./exploits/crlf-injection/payload/hackedflag +$ ug-exploit redis --redis-host unguard-redis:6379 ./exploits/crlf-injection/payload/hackedflag.txt ``` You can use any Redis client to verify that the exploit has worked. For convenience, you can SSH into the redis pod and