From bba3a6766d23e169c9c8dbc46eac61e9487826c1 Mon Sep 17 00:00:00 2001 From: Christophe Tafani-Dereeper Date: Tue, 1 Nov 2022 17:34:50 +0100 Subject: [PATCH] Update proof-of-concept-exploits/openssl-punycode-vulnerability/README.md Co-authored-by: Eslam Salem --- .../openssl-punycode-vulnerability/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/proof-of-concept-exploits/openssl-punycode-vulnerability/README.md b/proof-of-concept-exploits/openssl-punycode-vulnerability/README.md index 4e99e9e..7e5efc2 100644 --- a/proof-of-concept-exploits/openssl-punycode-vulnerability/README.md +++ b/proof-of-concept-exploits/openssl-punycode-vulnerability/README.md @@ -45,7 +45,7 @@ As you will see, this will cause openssl.exe to crash when verifying the malicio ## Compile it yourself -We provided a set of easy-to-uuse bash scripts to generate the certificate and run OpenSSL for both scenarios: +We provided a set of easy-to-use bash scripts to generate the certificate and run OpenSSL for both scenarios: * Malicious client sending crafted certificate to a server which verifies client certificates chain [here](./malicious_client/) * Malicious server having serving malicious crafted certificates chain to client. Clients will always checks for certificates chain [here](./malicious_server/)