diff --git a/documentation/modules/exploit/linux/http/empire_skywalker.md b/documentation/modules/exploit/linux/http/empire_skywalker.md index a677ba8459..ed354ca780 100644 --- a/documentation/modules/exploit/linux/http/empire_skywalker.md +++ b/documentation/modules/exploit/linux/http/empire_skywalker.md @@ -25,9 +25,9 @@ This module was successfully tested on: 5. Run the server. `docker run -it --net="host" -v /tmp:/tmp -v /etc/cron.d:/etc/cron.d bcsecurity/empire:v5.9.2` (`--net="host" -v /tmp:/tmp -v /etc/cron.d:/etc/cron.d` is not realistic but for simplicity.) -5. Run the client. +6. Run the client. `docker run -it --net="host" bcsecurity/empire:v5.9.2 client` -5. Execute Empire listener on client. +7. Execute Empire listener on client. ```bash uselistener http set Host @@ -64,9 +64,9 @@ run 5. Do: `set rport ` 6. Do: `set lhost ` 7. Optional: `set CVE ` -7. Do: `run` -8. Have the generated request processed by a vulnerable version of Empire -9. You should get a shell or meterpreter +8. Do: `run` +9. Have the generated request processed by a vulnerable version of Empire +10. You should get a shell or meterpreter ## Options