mirror of
https://github.com/cliffe/SecGen.git
synced 2026-02-21 19:28:02 +00:00
typo correction
This commit is contained in:
@@ -55,7 +55,6 @@
|
||||
</encoder>
|
||||
</input>
|
||||
|
||||
|
||||
<vulnerability module_path=".*/bludit_upload_images_exec">
|
||||
<input into="strings_to_leak">
|
||||
<generator type="flag_generator"/>
|
||||
|
||||
@@ -8,10 +8,10 @@
|
||||
<author>Z. Cliffe Schreuders</author>
|
||||
<description>
|
||||
# Introduction
|
||||
Once an attacker has a foothold in a system, they can misuse the privileges they have “appropriated” to take actions on the system, or go on to try to gain even more access on this or other connected systems. You will learn the skills used by an attacker or security tester, to take action once an expliot has been successful.
|
||||
Once an attacker has a foothold in a system, they can misuse the privileges they have “appropriated” to take actions on the system, or go on to try to gain even more access on this or other connected systems. You will learn the skills used by an attacker or security tester, to take action once an exploit has been successful.
|
||||
|
||||
# Suggested reading
|
||||
[An excellent resource is Metaploit Unleashed.](http://www.offensive-security.com/metasploit-unleashed/Exploits)
|
||||
[An excellent resource is Metasploit Unleashed.](http://www.offensive-security.com/metasploit-unleashed/Exploits)
|
||||
|
||||
# Lab
|
||||
[Lab sheet here](https://docs.google.com/document/d/1bt0yKzKjExEih5cmXyl-D__loGwV0UJxQJEDIXxCGxw/edit?usp=sharing).
|
||||
|
||||
Reference in New Issue
Block a user