Sandman icon indicating copy to clipboard operation
Sandman copied to clipboard

Can you give more explanation on this?

Open Ifex370 opened this issue 3 years ago • 1 comments

Your ReadME guide is not explicit enough on how to run this exploit. The URL and how te payload is generated is a little bit grey.

Ifex370 avatar Aug 22 '22 12:08 Ifex370

Hey, I have updated the README. Let me know what exactly is unclear and I'll add it as well.

Idov31 avatar Aug 22 '22 15:08 Idov31

Hey, I have updated the README. Let me know what exactly is unclear and I'll add it as well.

So I can I use mitmproxy to push the doll to downloads on windows and then add the ref value in windows and then arp spoof like how am I supposed to use this how do I initiate the reverse shell :/

ChillVibesMushroom avatar Dec 09 '22 18:12 ChillVibesMushroom

I'm not sure I understood what is your question. To initiate a reverse shell you will need to first have a reverse shell payload (in shellcode format), then change the PAYLOAD_SIZE variable here and give the URL to the payload as the 2nd parameter (e.g. https://127.0.0.1/evil) as explained in the readme file.

Idov31 avatar Dec 11 '22 14:12 Idov31