typo correction

This commit is contained in:
Z. Cliffe Schreuders
2021-11-10 20:11:12 +00:00
parent e13e15efd6
commit 2020a4bc90
2 changed files with 2 additions and 3 deletions

View File

@@ -55,7 +55,6 @@
</encoder>
</input>
<vulnerability module_path=".*/bludit_upload_images_exec">
<input into="strings_to_leak">
<generator type="flag_generator"/>

View File

@@ -8,10 +8,10 @@
<author>Z. Cliffe Schreuders</author>
<description>
# Introduction
Once an attacker has a foothold in a system, they can misuse the privileges they have “appropriated” to take actions on the system, or go on to try to gain even more access on this or other connected systems. You will learn the skills used by an attacker or security tester, to take action once an expliot has been successful.
Once an attacker has a foothold in a system, they can misuse the privileges they have “appropriated” to take actions on the system, or go on to try to gain even more access on this or other connected systems. You will learn the skills used by an attacker or security tester, to take action once an exploit has been successful.
# Suggested reading
[An excellent resource is Metaploit Unleashed.](http://www.offensive-security.com/metasploit-unleashed/Exploits)
[An excellent resource is Metasploit Unleashed.](http://www.offensive-security.com/metasploit-unleashed/Exploits)
# Lab
[Lab sheet here](https://docs.google.com/document/d/1bt0yKzKjExEih5cmXyl-D__loGwV0UJxQJEDIXxCGxw/edit?usp=sharing).