From 51b8416b8001ed5fed9f47ddf627214f1c495913 Mon Sep 17 00:00:00 2001 From: Swissky Date: Sat, 22 Jun 2019 15:22:45 +0200 Subject: [PATCH] HIP19 fix --- _posts/2019-6-22-HIP19-MeetYourDoctor.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/_posts/2019-6-22-HIP19-MeetYourDoctor.md b/_posts/2019-6-22-HIP19-MeetYourDoctor.md index 6e3f83c..ee00102 100755 --- a/_posts/2019-6-22-HIP19-MeetYourDoctor.md +++ b/_posts/2019-6-22-HIP19-MeetYourDoctor.md @@ -170,7 +170,7 @@ The injection worked, now we can re-use the payload from the challenge #2 and ex Obviously we scripted the data extraction in Python, the script below will get the last flag : `4f537c0a-7da6-4acc-81e1-8c33c02ef3b`. -{% highlight javascript %} +{% highlight php%} def blind_nosql(URL): data = "" data_size = 35