diff --git a/payloads/library/remote_access/Root_Reverse_Shell_linux_mac/README.md b/payloads/library/remote_access/Root_Reverse_Shell_linux_mac/README.md index 253ca4d4..143f5388 100644 --- a/payloads/library/remote_access/Root_Reverse_Shell_linux_mac/README.md +++ b/payloads/library/remote_access/Root_Reverse_Shell_linux_mac/README.md @@ -8,9 +8,9 @@ POC DIGISPARK LINK : https://drive.google.com/open?id=1DvKX8QXHImVRZMaoTvmtreFki Dont forgot to change IP in payload.sh Before using this payload don't forgot to start netcat listeners on port 4444 and 1337 Because it gives both user shell and root shell +Make sure switch is in 1st position. -When bash bunny executes payload in a machine wich is neither linux nor mac, it will download the payload.sh from server -then executes it and removes the payload.sh. +When bash bunny executes payload in a machine wich is neither linux nor mac, it will executes payload.sh. Once the payload.sh is executed as explained in the sudobackdoor script it will gets the root credential instead of storing it it will used for getting higher privileges and gives a reverse root netcat connection. Additionaly i have added a user level netcat connection also.