Skip to content

Commit 376ad8e

Browse files
author
David Bors
committed
10-end-to-end-chapter: fix: spellcheck errors
Fixed True Positive spellcheck errors. Some errors were FPs so not errors, and were left like they were. Signed-off-by: David Bors <borsdavid@proton.me>
1 parent 8d13e91 commit 376ad8e

File tree

4 files changed

+23
-4
lines changed

4 files changed

+23
-4
lines changed

chapters/web-application-security/10-end-to-end/drills/bounty-hacker/sol/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ R3dDRaG0Nsynd1c@T3
3636
...
3737
```
3838

39-
+ **Let's try to use this password file to connect on the ssh service, using simultanously the user found in the previous task. The Hydra tool has a brute-force option to crack the login of the ssh service, so we can use it**
39+
+ **Let's try to use this password file to connect on the ssh service, using simultaneously the user found in the previous task. The Hydra tool has a brute-force option to crack the login of the ssh service, so we can use it**
4040

4141
``hydra -l lin -P locks.txt 10.10.229.13 -t 4 ssh``
4242

@@ -57,7 +57,7 @@ R3dDRaG0Nsynd1c@T3
5757

5858
# ![5](images/whoami.jpg?raw=true "whoami")
5959

60-
+ **Tar is a linux utilitary, used by a lot of unix system administrators to create compressed archive files or to extract them. Looking into the tar manual, we can see that it has an option that can execute a command during the compress-program**
60+
+ **Tar is a linux archiving utility, used by a lot of unix system administrators to create compressed archive files or to extract them. Looking into the tar manual, we can see that it has an option that can execute a command during the compress-program**
6161

6262
# ![6](images/tar.jpg?raw=true "tar manual")
6363

chapters/web-application-security/10-end-to-end/drills/brooklyn-nine-nine/sol/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@
2323
``get note_to_jake.txt``
2424
# ![3](images/change_password.jpg?raw=true "cp")
2525

26-
+ **Looks that Jake need to change his password. Because jake is using a very weak password, maybe we can bruteforce his login to some service. Let's use hydra to bruteforce the ssh serice - i'm using the rockyou.txt wordlist**
26+
+ **Looks that Jake need to change his password. Because jake is using a very weak password, maybe we can brute-force his login to some service. Let's use hydra to brute-force the ssh service - I'm using the rockyou.txt wordlist**
2727

2828
``hydra -l jake -P /usr/share/wordlists/rockyou.txt 10.10.244.52 -t 4 ssh``
2929

chapters/web-application-security/10-end-to-end/reading/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -266,7 +266,7 @@ curl -X "GET" http://<IP>:8080/?doAs=`<command_to_execute>`
266266
```
267267

268268
The backtick is the start of an instruction to bash to evaluate what you type as a command. Everything you type between backticks (`) is evaluated by the shell before the main command and the output of that execution is used by that command, just as if you'd type that output at that place in the command line.
269-
So, the command between the backticks inside the URL will be firstly intepreted by our shell and then by the target shell.
269+
So, the command between the backticks inside the URL will be firstly interpreted by our shell and then by the target shell.
270270

271271
To read the output of the command and to check if that command was executed on the vulnerable server, we will send a request to [RequestBin](https://requestbin.io).
272272
[RequestBin](https://requestbin.io) gives you a URL that will collect requests made to it and let you inspect them in a human-friendly way.
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
import re
2+
3+
# Read the content of the file
4+
with open('index.md', 'r') as file:
5+
content = file.read()
6+
7+
# Define the regex pattern to match and the replacement pattern
8+
pattern = r'<img src="\.\./media/([^"]+)" width=\d+ height=\d+>'
9+
replacement = r'![\1](../media/\1)'
10+
11+
# Replace the content
12+
modified_content = re.sub(pattern, replacement, content)
13+
14+
# Write the modified content back to the file
15+
with open('index.md', 'w') as file:
16+
file.write(modified_content)
17+
18+
print("Replacement done!")
19+

0 commit comments

Comments
 (0)