From b07a7e305153fb62d0e490b8c5f32cd70a871676 Mon Sep 17 00:00:00 2001 From: thomashaw Date: Tue, 17 Feb 2026 13:50:12 +0000 Subject: [PATCH] Exploit Development: Updated home dir to kali user rather than root --- _labs/software_security_exploitation/4_exploit_development.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/_labs/software_security_exploitation/4_exploit_development.md b/_labs/software_security_exploitation/4_exploit_development.md index 3881c0e..0fc0dca 100644 --- a/_labs/software_security_exploitation/4_exploit_development.md +++ b/_labs/software_security_exploitation/4_exploit_development.md @@ -140,9 +140,9 @@ Depending on the number of 'A's you have entered, OllyDdg will report an "access ==VM: On the Kali Linux VM (attacker/exploit development)== -==action: Create a Metasploit exploit module, and save it as **FreeFloatMKDoverflow.rb** in **/root/.msf4/modules/exploits/windows/ftp/**:== +==action: Create a Metasploit exploit module, and save it as **FreeFloatMKDoverflow.rb** in **/home/kali/.msf4/modules/exploits/windows/ftp/**:== -> Hint: To make the directory path, you can run `mkdir -p /root/.msf4/modules/exploits/windows/ftp/` +> Hint: To make the directory path, you can run `mkdir -p /home/kali/.msf4/modules/exploits/windows/ftp/` ```ruby require 'msf/core'