diff --git a/payloads/library/credentials/Jackalope/readme.md b/payloads/library/credentials/Jackalope/readme.md index 52918c81..6b3c4c32 100644 --- a/payloads/library/credentials/Jackalope/readme.md +++ b/payloads/library/credentials/Jackalope/readme.md @@ -26,7 +26,7 @@ Uses ethernet to attempt dictionary attacks against passwords. When the password To clear a stored password move the switch to switch3 (aka arming mode) after the payload runs and displays GREEN. The status light will change to SPECIAL (cyan) indicating the password has been removed. Positioning the switch to switch1 or switch2 will re-initiate the attack. ## Configuration -No initial configuration is required for bunny firmware v1.6+. +You must have metasploit installation up and running in path /tools/metasploit-framework/ ### Per attack configuration 1. userlist.txt contains usernames to use in attack.