mirror of
https://github.com/ChendoChap/pOOBs4.git
synced 2024-11-19 17:32:32 +01:00
Update README.md
This commit is contained in:
parent
dacb809ab7
commit
dcc5886c89
@ -17,7 +17,7 @@ The following patches are applied to the kernel:
|
|||||||
## Short how-to
|
## Short how-to
|
||||||
This exploit is unlike previous ones where they were based purely in software. Triggering the vulnerability requires plugging in a specially formatted USB device at just the right time. In the repository you'll find a .img file. You can write this .img to a USB using something like Win32DiskImager.
|
This exploit is unlike previous ones where they were based purely in software. Triggering the vulnerability requires plugging in a specially formatted USB device at just the right time. In the repository you'll find a .img file. You can write this .img to a USB using something like Win32DiskImager.
|
||||||
|
|
||||||
**Note: This will wipe the device, ensure you select the correct drive and that you're OK with that before doing this**
|
**Note: This will wipe the USB drive, ensure you select the correct drive and that you're OK with that before doing this**
|
||||||
|
|
||||||
![](https://i.imgur.com/qpiVQGo.png)
|
![](https://i.imgur.com/qpiVQGo.png)
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user