From a478d12e1f25810424ba6d8619469b9f1907199c Mon Sep 17 00:00:00 2001 From: Postmodern Date: Sat, 23 Dec 2023 18:52:00 -0800 Subject: [PATCH] Fixed explaination of `http_get`. --- ...3-solving-advent-of-cyber-2023-day-22-with-ronin-exploits.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/blog/_posts/2023-12-23-solving-advent-of-cyber-2023-day-22-with-ronin-exploits.md b/blog/_posts/2023-12-23-solving-advent-of-cyber-2023-day-22-with-ronin-exploits.md index 6ceb87c4..16275447 100644 --- a/blog/_posts/2023-12-23-solving-advent-of-cyber-2023-day-22-with-ronin-exploits.md +++ b/blog/_posts/2023-12-23-solving-advent-of-cyber-2023-day-22-with-ronin-exploits.md @@ -38,7 +38,7 @@ files requested with `file://` are returned in the HTTP response body. Requesting a file that does not exist on the system will result in a HTTP 200 response, but with an empty response body. To send the HTTP request, we will use the [http_get] helper method, which accepts a path and additional query -params, sends a HTTP `GET` request, and returns the response body as a String. +params, sends a HTTP `GET` request, and returns the HTTP response object. We will also need to define a `file` param for the local file we wish to request via `file://` SSRF. Since this is a super simple SSRF exploit, we will only need to fill in the `launch` method.