From 300b857506a8d2daba5b9ee3d6f1dc0c932d03f1 Mon Sep 17 00:00:00 2001 From: Olivier Karasangabo Date: Tue, 7 Nov 2023 10:31:39 +0100 Subject: [PATCH] =?UTF-8?q?=F0=9F=93=9D=20docs(crlf-injection):=20Fix=20pa?= =?UTF-8?q?th=20to=20redis=20payload=20file?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- exploit-toolkit/exploits/crlf-injection/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exploit-toolkit/exploits/crlf-injection/README.md b/exploit-toolkit/exploits/crlf-injection/README.md index d333600d..31357159 100644 --- a/exploit-toolkit/exploits/crlf-injection/README.md +++ b/exploit-toolkit/exploits/crlf-injection/README.md @@ -45,7 +45,7 @@ Next, send your payload. Make sure to specify the Redis instance that is reachab Within Docker or K8s, this should be `unguard-redis:6379`. ```shell -$ ug-exploit redis --redis-host unguard-redis:6379 ./exploits/crlf-injection/payload/hackedflag +$ ug-exploit redis --redis-host unguard-redis:6379 ./exploits/crlf-injection/payload/hackedflag.txt ``` You can use any Redis client to verify that the exploit has worked. For convenience, you can SSH into the redis pod and