diff --git a/Rapid_Shell/README.md b/Rapid_Shell/README.md index e40329d..0ee02d2 100644 --- a/Rapid_Shell/README.md +++ b/Rapid_Shell/README.md @@ -9,7 +9,7 @@ # Additional information: #### How it works: The Digispark once it is plugged in will take 5 seconds for the bootloader, and starts its job when the second led lights up, it will first open CMD as administrator using the start menu and create a new file which will be used to trigger the attack and open the shell. - There is another way to open CMD as administrator, which is using the run prompt and running this command: "powershell Start-Process cmd -Verb runAs" but it showed that it takes much time to open the powershell prompt. If you desire to use this method refer to the comments in the code. + There is another way to open CMD as administrator, which is using the run prompt and running this command: "powershell Start-Process cmd -Verb runAs" but it showed that it takes much time to open the powershell prompt. If you desire to use this method (cmd_2) refer to the comments in the code. #### Tricks: - You can reduce the running time by 5-8 seconds by tricking the bootloader, visit [this page](https://digistump.com/wiki/digispark/tricks) for more. - The powershell script features a 6 seconds screensaver to hide the backdooring process, we will make it possible to disable/enable in the future.