diff --git a/documentation/modules/exploit/unix/http/pfsense_clickjacking.md b/documentation/modules/exploit/unix/http/pfsense_clickjacking.md index 5ce56489bd..f286991927 100644 --- a/documentation/modules/exploit/unix/http/pfsense_clickjacking.md +++ b/documentation/modules/exploit/unix/http/pfsense_clickjacking.md @@ -11,7 +11,7 @@ The victim should be able to access the WebGUI & must be logged in as admin in o 1. `use exploit/unix/http/pfsense_clickjacking` 2. `set TARGETURI https://` 3. `exploit` - 4. Browse to the URL return by MSF + 4. Browse to the URL returned by MSF 5. Click anywhere on the returned page 6. Note that a new Meterpreter sessions was started.