From 2020a4bc90bd3ffab84507e1fa0c8d611e33e378 Mon Sep 17 00:00:00 2001 From: "Z. Cliffe Schreuders" Date: Wed, 10 Nov 2021 20:11:12 +0000 Subject: [PATCH] typo correction --- scenarios/ctf/feeling_blu.xml | 1 - scenarios/labs/introducing_attacks/7_post-exploitation.xml | 4 ++-- 2 files changed, 2 insertions(+), 3 deletions(-) diff --git a/scenarios/ctf/feeling_blu.xml b/scenarios/ctf/feeling_blu.xml index 4b83b032a..043a4bf9b 100644 --- a/scenarios/ctf/feeling_blu.xml +++ b/scenarios/ctf/feeling_blu.xml @@ -55,7 +55,6 @@ - diff --git a/scenarios/labs/introducing_attacks/7_post-exploitation.xml b/scenarios/labs/introducing_attacks/7_post-exploitation.xml index d24565558..063f28f09 100644 --- a/scenarios/labs/introducing_attacks/7_post-exploitation.xml +++ b/scenarios/labs/introducing_attacks/7_post-exploitation.xml @@ -8,10 +8,10 @@ Z. Cliffe Schreuders # Introduction -Once an attacker has a foothold in a system, they can misuse the privileges they have “appropriated” to take actions on the system, or go on to try to gain even more access on this or other connected systems. You will learn the skills used by an attacker or security tester, to take action once an expliot has been successful. +Once an attacker has a foothold in a system, they can misuse the privileges they have “appropriated” to take actions on the system, or go on to try to gain even more access on this or other connected systems. You will learn the skills used by an attacker or security tester, to take action once an exploit has been successful. # Suggested reading -[An excellent resource is Metaploit Unleashed.](http://www.offensive-security.com/metasploit-unleashed/Exploits) +[An excellent resource is Metasploit Unleashed.](http://www.offensive-security.com/metasploit-unleashed/Exploits) # Lab [Lab sheet here](https://docs.google.com/document/d/1bt0yKzKjExEih5cmXyl-D__loGwV0UJxQJEDIXxCGxw/edit?usp=sharing).