From 04d19c4c94c972b621526ca33b8b0d2eb1f18c4a Mon Sep 17 00:00:00 2001 From: Darkprince <30362337+sridharas04@users.noreply.github.com> Date: Sat, 16 May 2020 14:12:42 +0530 Subject: [PATCH] Minor changes in description. --- .../remote_access/Root_Reverse_Shell_linux_mac/README.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/payloads/library/remote_access/Root_Reverse_Shell_linux_mac/README.md b/payloads/library/remote_access/Root_Reverse_Shell_linux_mac/README.md index 143f5388..b2412da3 100644 --- a/payloads/library/remote_access/Root_Reverse_Shell_linux_mac/README.md +++ b/payloads/library/remote_access/Root_Reverse_Shell_linux_mac/README.md @@ -5,10 +5,10 @@ ### If any issues put in discussion i will fix it POC DIGISPARK LINK : https://drive.google.com/open?id=1DvKX8QXHImVRZMaoTvmtreFkiL4rwYF- ### Special thanks to sudobackdoor for bash script sample -Dont forgot to change IP in payload.sh -Before using this payload don't forgot to start netcat listeners on port 4444 and 1337 -Because it gives both user shell and root shell -Make sure switch is in 1st position. +Dont forgot to change IP in payload.sh.
+Before using this payload don't forgot to start netcat listeners on port 4444 and 1337.
+It reverse connects user shell in port 4444 and root shell in port 1337.
+Make sure switch is in position 1.
When bash bunny executes payload in a machine wich is neither linux nor mac, it will executes payload.sh.