Skip to content

Commit ca76181

Browse files
arpitjain099smcintyre-r7
authored andcommitted
Improve code quality
1 parent 9e90b5d commit ca76181

10 files changed

+10
-10
lines changed

docs/metasploit-framework.wiki/Creating-Your-First-PR.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Additionally any information about caveats, scenarios you have tested, custom op
8585
should also go into this file.
8686

8787
## Checking Documentation Syntax
88-
Once you have written the documentation, you then want to run `toos/dev/msftidy_docs.rb <path to documentation file>`. This will report on any
88+
Once you have written the documentation, you then want to run `tools/dev/msftidy_docs.rb <path to documentation file>`. This will report on any
8989
errors with your documentation file, which you will want to fix before submitting your PR. Notice however that if you get a warning about long lines,
9090
these may be okay to ignore depending on the context. A good example is if a line is long merely because of a URL. Such warnings can be
9191
safely ignored.

docs/metasploit-framework.wiki/GSoC-2021-Project-Ideas.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ Mentors: [@zerosteiner](https://github.com/zerosteiner), [@jmartin-r7](https://g
66

77
### Retain active status of authentication tokens
88

9-
Many testing techniques interacting with web servers such as `XSS` rely on ensuring authentication obtained on a target be kept active. A mechanism for registering and maintaining open authentications identified during a test for the duration of the console session may provide an additional utility to enable more modules to target techniques that need valid authentication to be maintained. One such authentication token would be data retained in a cookie for a web service. This project would lay the groundwork for registering gathered or generated authenticaion tokens against a target to be refreshed and sustained until a console exits, or in some cases across console restarts.
9+
Many testing techniques interacting with web servers such as `XSS` rely on ensuring authentication obtained on a target be kept active. A mechanism for registering and maintaining open authentications identified during a test for the duration of the console session may provide an additional utility to enable more modules to target techniques that need valid authentication to be maintained. One such authentication token would be data retained in a cookie for a web service. This project would lay the groundwork for registering gathered or generated authentication tokens against a target to be refreshed and sustained until a console exits, or in some cases across console restarts.
1010

1111
Difficulty: 2/5
1212

docs/metasploit-framework.wiki/How-to-use-Metasploit-Messagepack-RPC.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ Which returns the following response:
5252

5353
### Start the server
5454

55-
Use the following command to run the server with a configured uesrname and password:
55+
Use the following command to run the server with a configured username and password:
5656

5757
```
5858
$ ruby msfrpcd -U user -P pass -f

docs/metasploit-framework.wiki/Keeping-in-sync-with-rapid7-master.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ The term 'repo' is short for 'Repository.' Also known as 'fork' (as a noun).
66

77
## The Easy Way
88

9-
The easiest way to keep in sync with master is to trash your fork of `metasploit-framework`, and re-fork. This is a surprisingly common practice, since most people in the world don't work with Metasploit every day. If you're the sort to be struck by hackerish inspiration every few months, and couldn't give a whit about preserving branches, history, or pull requests, simply nuke your local fork.
9+
The easiest way to keep in sync with master is to trash your fork of `metasploit-framework`, and re-fork. This is a surprisingly common practice, since most people in the world don't work with Metasploit every day. If you're the sort to be struck by hackerish inspiration every few months, and couldn't give a with about preserving branches, history, or pull requests, simply nuke your local fork.
1010

1111
On your fork, in the GitHub UI, go to **Settings**, scroll down to the **Danger Zone**, and hit **Delete this repository**. Once you've re-authenticated, re-fork the `metasploit-framework` repository by going to the [Rapid7 repo](https://github.com/rapid7/metasploit-framework) and hit **Fork** as hard as you possibly can.
1212

docs/metasploit-framework.wiki/Metasploit-Guide-MySQL.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ use auxiliary/scanner/mysql/mysql_login
4949
run 'mysql://root: a b c [email protected]'
5050
```
5151

52-
Re-using MySQL credentials in a subnet:
52+
Reusing MySQL credentials in a subnet:
5353

5454
```
5555
use auxiliary/scanner/mysql/mysql_login

docs/metasploit-framework.wiki/Metasploit-Guide-PostgreSQL.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ use auxiliary/scanner/postgres/postgres_login
5151
run 'postgres://root: a b c [email protected]'
5252
```
5353

54-
Re-using PostgreSQL credentials in a subnet:
54+
Reusing PostgreSQL credentials in a subnet:
5555

5656
```
5757
use auxiliary/scanner/postgres/postgres_login

docs/metasploit-framework.wiki/Metasploit-Guide-SSH.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ use scanner/ssh/ssh_login
115115
run ssh://user:[email protected]
116116
```
117117

118-
Re-using SSH credentials in a subnet:
118+
Reusing SSH credentials in a subnet:
119119

120120
```
121121
use scanner/ssh/ssh_login

docs/metasploit-framework.wiki/Meterpreter-Wishlist.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ Related open tickets (slightly broader than Meterpreter):
7171
* Change desktop/phone background
7272
* Remote mouse control
7373
* Play sound on the remote system
74-
* Read words outloud via text to speech on the remote system
74+
* Read words out loud via text to speech on the remote system
7575
* Volume control
7676
* RSS feed from reverse_http(s) mult-handler that I can connect a RSS reader to (or something like IFTTT) and get notices when new sessions are created
7777
* MessageBox popups

docs/metasploit-framework.wiki/Pivoting-in-Metasploit.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,7 @@ Payload options (cmd/windows/powershell_reverse_tcp):
195195
Name Current Setting Required Description
196196
---- --------------- -------- -----------
197197
LHOST 172.19.182.171 yes The listen address (an interface may be speci
198-
fied)
198+
field)
199199
LOAD_MODULES no A list of powershell modules separated by a c
200200
omma to download over the web
201201
LPORT 4444 yes The listen port

scripts/meterpreter/hostsedit.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ def backuphosts(session,hosts)
6767
random = sprintf("%.5d",rand(100000))
6868
print_status("Making Backup of the hosts file.")
6969
session.sys.process.execute("cmd /c copy #{hosts} #{hosts}#{random}.back",nil, {'Hidden' => true})
70-
print_status("Backup loacated in #{hosts}#{random}.back")
70+
print_status("Backup located in #{hosts}#{random}.back")
7171
end
7272
# Clear DNS Cached entries
7373
def cleardnscach(session)

0 commit comments

Comments
 (0)