1
0
mirror of https://github.com/ChendoChap/pOOBs4 synced 2024-12-21 21:48:48 -05:00

Update README.md

This commit is contained in:
Specter 2021-12-13 02:45:37 -05:00 committed by GitHub
parent dacb809ab7
commit dcc5886c89
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -17,7 +17,7 @@ The following patches are applied to the kernel:
## Short how-to
This exploit is unlike previous ones where they were based purely in software. Triggering the vulnerability requires plugging in a specially formatted USB device at just the right time. In the repository you'll find a .img file. You can write this .img to a USB using something like Win32DiskImager.
**Note: This will wipe the device, ensure you select the correct drive and that you're OK with that before doing this**
**Note: This will wipe the USB drive, ensure you select the correct drive and that you're OK with that before doing this**
![](https://i.imgur.com/qpiVQGo.png)