Skip to content

Commit

Permalink
typos
Browse files Browse the repository at this point in the history
  • Loading branch information
spencerdodd committed Mar 9, 2018
1 parent d9963d8 commit 36627fd
Showing 1 changed file with 8 additions and 4 deletions.
12 changes: 8 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,8 @@ on the following operating systems:

- [x] Mac

---

### example of enumeration to root (Linux)

![got-root](img/final.gif)
Expand Down Expand Up @@ -57,21 +59,23 @@ In the output, there are a few categories. This is what each means

**[[ distro kernel matched exploit available ]]**

* there is a specific distro specific matched kernel exploit in the project that you can use to exploit the kernel.
* there is a distro version specific matched kernel exploit in the project that you can use to exploit the kernel.
High likelihood of successful exploitation.

**[[ distro kernel version vulnerable ]]**

* the distro kernel is vulnerable to the vulnerability listed, but was not explicitly stated as tested in the PoC
exploit in the project. Exploitation without modification of the exploit may work, but has a lower likelihood of
* the distro kernel version is vulnerable to the vulnerability listed, but was not explicitly stated as tested in the
PoC exploit in the project. Exploitation without modification of the exploit may work, but has a lower likelihood of
success.

**[[ base linux kernel vulnerable ]]**

* it is unknown if the distro kernel is vulnerable to the vulnerability, but the base linux kernel is in the
* it is unknown if the distro kernel version is vulnerable to the vulnerability, but the base linux kernel is in the
vulnerable range for the exploit. Exploitation without modification of the exploit is either unlikely or unknown,
but may still work.

---

### requirements

`python3`
Expand Down

0 comments on commit 36627fd

Please sign in to comment.