From 3a14ac3b37ebcdf7cb4e0bf5424190e1eb9d7c0c Mon Sep 17 00:00:00 2001 From: Chris Higgins Date: Sat, 9 Dec 2017 02:30:42 -0600 Subject: [PATCH] Fixed a spelling error in documentation --- .../modules/exploit/windows/smtp/sysgauge_client_bof.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/documentation/modules/exploit/windows/smtp/sysgauge_client_bof.md b/documentation/modules/exploit/windows/smtp/sysgauge_client_bof.md index d422147189..467f8c3603 100644 --- a/documentation/modules/exploit/windows/smtp/sysgauge_client_bof.md +++ b/documentation/modules/exploit/windows/smtp/sysgauge_client_bof.md @@ -4,7 +4,7 @@ via its SMTP server validation. The module sends a malicious response along in the 220 service ready response and exploits the client, resulting in an unprivileged shell. - he software is available for download from [SysGauge](http://www.sysgauge.com/setups/sysgauge_setup_v1.5.18.exe). + The software is available for download from [SysGauge](http://www.sysgauge.com/setups/sysgauge_setup_v1.5.18.exe). ## Verification Steps