From 535928ab7073778cb426d1bf756b967fa887b3b6 Mon Sep 17 00:00:00 2001 From: Starthur Date: Fri, 6 May 2022 14:00:17 +0200 Subject: [PATCH] Update 'README.md' --- README.md | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index 2d391fb..b951b5a 100644 --- a/README.md +++ b/README.md @@ -13,10 +13,12 @@ Here is a docker image to use to solve most of the CTF on the platform! If you a ``` ## Usage -`docker run --security-opt seccomp=unconfined --rm -v $PWD:/work -it atrouill/42ctf /bin/ash` +``` +docker run --security-opt seccomp=unconfined --rm -v `pwd`:/42ctf -it atrouill/42ctf /bin/ash +``` For more simplicity you can do : - -`echo 'alias 42ctf="docker run --security-opt seccomp=unconfined --rm -v $PWD:/work -it atrouill/42ctf /bin/ash"' >> ~/.zshrc && source ~/.zshrc` - +```bash +echo 'alias 42ctf="docker run --security-opt seccomp=unconfined --rm -v `pwd`:/42ctf -it atrouill/42ctf /bin/ash"' >> ~/.zshrc && source ~/.zshrc +``` Then you just have to run `42ctf` in the folder where your binaries are! \ No newline at end of file