Apply suggestions from code review

Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
This commit is contained in:
Nuri Çilengir
2022-07-22 12:51:40 +00:00
committed by GitHub
parent 420e67aca9
commit fc3b08fb8b
2 changed files with 17 additions and 25 deletions
@@ -10,7 +10,7 @@ Successful exploitation results in remote code execution under the context of th
Roxy-WI requires Python and a web server to run. Please visit following url to find out required python and other packages.
[https://roxy-wi.org/installation.py](https://roxy-wi.org/installation.py)
https://roxy-wi.org/installation.py#manual
```
git clone https://github.com/hap-wi/roxy-wi.git /var/www/haproxy-wi
@@ -24,12 +24,11 @@ chown -R www-data:www-data haproxy-wi
1. Install the application
2. Start msfconsole
3. Do: `use exploit/linux/http/roxy_wi_exec`
4. Set `RHOST`
5. Set `LHOST`
4. Set `RHOST` to the address of the target Roxy-WI machine.
5. Set `LHOST` to the address of your attacking machine.
8. Run `exploit`
9. Do: `run`
10. You should get a shell.
11. **Verify** that you are getting meterpreter session.
10. You should get a shell as the user running the Roxy-WI server.
## Options
Set `TAGETURI` if the Roxy-WI is installed at a custom path.