diff --git a/README.md b/README.md index aff6bc5..d31e4c5 100644 --- a/README.md +++ b/README.md @@ -95,7 +95,7 @@ https://github.com/AleksaMCode/WiFi-password-stealer/blob/598e2454855374a9cd362c >
### Linux exploit -In order to use the Linux payload (payload2.dd
) you need to connect a jumper wire between GND
and GPIO5
in order to comply with the code in code.py
on your RPi Pico. For more information about how to setup multiple payloads on your RPi Pico visit this link.
In order to use the Linux payload (payload2.dd
) you need to connect a jumper wire between GND
and GPIO5
in order to comply with the code in code.py
on your RPi Pico. For more information about how to setup multiple payloads on your RPi Pico visit this link.
Once passwords have been exported from the computer, data will be saved to the appointed USB flash drive. In order for this payload to function properly, it needs to be updated with the correct name of your USB drive, meaning you will need to replace UsbStick with the name of your USB drive in two places.