From 04d19c4c94c972b621526ca33b8b0d2eb1f18c4a Mon Sep 17 00:00:00 2001
From: Darkprince <30362337+sridharas04@users.noreply.github.com>
Date: Sat, 16 May 2020 14:12:42 +0530
Subject: [PATCH] Minor changes in description.
---
.../remote_access/Root_Reverse_Shell_linux_mac/README.md | 8 ++++----
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/payloads/library/remote_access/Root_Reverse_Shell_linux_mac/README.md b/payloads/library/remote_access/Root_Reverse_Shell_linux_mac/README.md
index 143f5388..b2412da3 100644
--- a/payloads/library/remote_access/Root_Reverse_Shell_linux_mac/README.md
+++ b/payloads/library/remote_access/Root_Reverse_Shell_linux_mac/README.md
@@ -5,10 +5,10 @@
### If any issues put in discussion i will fix it
POC DIGISPARK LINK : https://drive.google.com/open?id=1DvKX8QXHImVRZMaoTvmtreFkiL4rwYF-
### Special thanks to sudobackdoor for bash script sample
-Dont forgot to change IP in payload.sh
-Before using this payload don't forgot to start netcat listeners on port 4444 and 1337
-Because it gives both user shell and root shell
-Make sure switch is in 1st position.
+Dont forgot to change IP in payload.sh.
+Before using this payload don't forgot to start netcat listeners on port 4444 and 1337.
+It reverse connects user shell in port 4444 and root shell in port 1337.
+Make sure switch is in position 1.
When bash bunny executes payload in a machine wich is neither linux nor mac, it will executes payload.sh.