From 3b99e7f1b57c56d14ce82b60f96628780166d9e6 Mon Sep 17 00:00:00 2001
From: Ben Lorenz <bnlrnz@gmail.com>
Date: Mon, 8 Feb 2021 09:51:31 +0100
Subject: [PATCH] Update README.md

---
 README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/README.md b/README.md
index 75e6e0a..1ce57f9 100644
--- a/README.md
+++ b/README.md
@@ -18,7 +18,7 @@ make clean # you know what it does
 
 If you enable PIE/PIC you need to recalculate the function address of "secretFunction" and run the buffer overflow in gdb (which disables [aslr](https://en.wikipedia.org/wiki/Address_space_layout_randomization) internally) or temporarily deactivate aslr globally for your kernel or locally in a shell session.
 
-### Global
+### Global (needs root)
 ```bash
 echo 0 | sudo tee /proc/sys/kernel/randomize_va_space
 ```
-- 
GitLab