mirror of
https://github.com/hak5/bashbunny-payloads.git
synced 2025-10-29 16:58:25 +00:00
Jackalope: Update README to show Metasploit dependency.
Provided information on the dependency of Metasploit for the payload to work. Provided information on the installation of the tool accordingly.
This commit is contained in:
parent
6e0955fb2b
commit
fc0fa47dcb
@ -26,7 +26,9 @@ Uses ethernet to attempt dictionary attacks against passwords. When the password
|
||||
To clear a stored password move the switch to switch3 (aka arming mode) after the payload runs and displays GREEN. The status light will change to SPECIAL (cyan) indicating the password has been removed. Positioning the switch to switch1 or switch2 will re-initiate the attack.
|
||||
|
||||
## Configuration
|
||||
You must have metasploit installation up and running in path /tools/metasploit-framework/
|
||||
You must have metasploit installation up and running in path /tools/metasploit-framework/
|
||||
Information and instructions for the installation of additional tools to the Bash Bunny can be found [here](https://docs.hak5.org/hc/en-us/articles/360010554133-Installing-and-using-additional-tools).
|
||||
No further initial configuration is required for bunny firmware v1.6+.
|
||||
|
||||
### Per attack configuration
|
||||
1. userlist.txt contains usernames to use in attack.
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user