Skip to content

Commit 9fbfe63

Browse files
Update documentation/modules/exploit/windows/misc/ivanti_avalanche_mdm_bof.md
Co-authored-by: cgranleese-r7 <[email protected]>
1 parent 4088276 commit 9fbfe63

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

documentation/modules/exploit/windows/misc/ivanti_avalanche_mdm_bof.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Upon successful exploitation the attacker gains full access to the target system
1616
The original analysis and the vulnerability discovery is done by the Tenable.
1717
Check [here](https://www.tenable.com/security/research/tra-2023-27) for public advisory.
1818

19-
## Testing
19+
## Installation
2020
For installing the vulnerable version follow the steps below,
2121
1. To obtain the vulnerable versions of the MDM setup, first create a customer account at
2222
[Ivanti](https://success.ivanti.com/customers/Community_RegStep1_Page?lp=register) (trial license is sufficient)

0 commit comments

Comments
 (0)