diff --git a/Payloads/Flip-ShortcutJacker/README.md b/Payloads/Flip-ShortcutJacker/README.md index 0592e9e..6f926fc 100644 --- a/Payloads/Flip-ShortcutJacker/README.md +++ b/Payloads/Flip-ShortcutJacker/README.md @@ -30,23 +30,23 @@
YouTube Tutorial

-A script used to embed malware in the shortcut on your targets desktop +A script used to embed malware in the shortcut on your target's desktop. ## Description -This payload will run a powershell script in the background of any shortcut used on the targets desktop. +This payload will run a PowerShell script in the background of any shortcut used on the targets desktop. -This is done by taking advantage of the `Target` field where powershell commands can be stored or run. +This is done by taking advantage of the `Target` field where PowerShell commands can be stored or run. This field can store a max of 259 VISIBLE characters in that bar however after some testing I found you can store 924 characters int the `$code` variable and it will still run. -So if your command exceeds that consider using an IWR function to download and execute a longer script. +So if your command exceeds that, consider using an IWR function to download and execute a longer script. I have an Invoke WebRequest tutorial for that [HERE](https://www.youtube.com/watch?v=bPkBzyEnr-w&list=PL3NRVyAumvmppdfMFMUzMug9Cn_MtF6ub&index=13) -Inside the .ps1 file you will find a line at the beginning with a ```$code``` variable. This is where the powershell code you want executed is stored. +Inside the .ps1 file you will find a line at the beginning with a ```$code``` variable. This is where the PowerShell code you want executed is stored. --------------------------------------------------------------------------------------------------------------------------------------------------------- @@ -60,7 +60,7 @@ Using the `Get-Shortcut` function we will get the following information we can t ## Getting Started -Once the script is executed all of the shortcuts on your target's desktop will be infected with the powershell code you have stored in the `$code` variable in the .ps1 file +Once the script is executed, all of the shortcuts on your target's desktop will be infected with the PowerShell code you have stored in the `$code` variable in the .ps1 file ### Dependencies