First run "docker-compose up -d", this starts a minimal vulnerable HTTPS server Then run "./exploit.sh" and this should exploit and dump the received data