From 8c13b961a3dfd9e2eb5a4524e0aa0329d56c0dc9 Mon Sep 17 00:00:00 2001 From: Darkprince <30362337+sridharas04@users.noreply.github.com> Date: Sat, 16 May 2020 14:08:56 +0530 Subject: [PATCH] Updated Description --- .../remote_access/Root_Reverse_Shell_linux_mac/README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/payloads/library/remote_access/Root_Reverse_Shell_linux_mac/README.md b/payloads/library/remote_access/Root_Reverse_Shell_linux_mac/README.md index 253ca4d4..143f5388 100644 --- a/payloads/library/remote_access/Root_Reverse_Shell_linux_mac/README.md +++ b/payloads/library/remote_access/Root_Reverse_Shell_linux_mac/README.md @@ -8,9 +8,9 @@ POC DIGISPARK LINK : https://drive.google.com/open?id=1DvKX8QXHImVRZMaoTvmtreFki Dont forgot to change IP in payload.sh Before using this payload don't forgot to start netcat listeners on port 4444 and 1337 Because it gives both user shell and root shell +Make sure switch is in 1st position. -When bash bunny executes payload in a machine wich is neither linux nor mac, it will download the payload.sh from server -then executes it and removes the payload.sh. +When bash bunny executes payload in a machine wich is neither linux nor mac, it will executes payload.sh. Once the payload.sh is executed as explained in the sudobackdoor script it will gets the root credential instead of storing it it will used for getting higher privileges and gives a reverse root netcat connection. Additionaly i have added a user level netcat connection also.