We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent cc9ecf3 commit 6a58a3dCopy full SHA for 6a58a3d
documentation/modules/exploit/windows/misc/cisco_webex_ext.md
@@ -12,8 +12,6 @@ Cisco WebEx Chrome Extension 1.0.1 is known to be affected.
12
13
## Verification Steps
14
15
-**Using cisco_webex_ext**
16
-
17
1. Start msfconsole
18
2. Do: ```use exploit/windows/misc/cisco_webex_ext```
19
3. Do: ```set SRVHOST [IP ADDRESS]```
@@ -22,6 +20,8 @@ Cisco WebEx Chrome Extension 1.0.1 is known to be affected.
22
20
6. Do: ```Choose a payload and set any specific options```
23
21
6. Do: ```run```, after a target browses to the generated URL, you should receive a session like the following:
24
+## Demo
+
25
```
26
msf > use exploits/windows/misc/cisco_webex_ext
27
msf exploit(cisco_webex_ext) > set srvhost 10.6.0.151
0 commit comments