Skip to content

Commit 31b2d69

Browse files
Fix typo in flow.mdx (#119)
1 parent c0eb442 commit 31b2d69

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

templates/protocols/flow.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ These features are implemented using JavaScript (ECMAScript 5.1) via the [goja](
1919

2020
Many times when writing complex templates we might need to add some extra checks (or conditional statements) before executing certain part of request.
2121

22-
An ideal example of this would be when [bruteforcing wordpress login](https://cloud.projectdiscovery.io/public/wordpress-weak-credentials) with default usernames and passwords, but if we carefully re-evaluate this template, we can see that template is sending 276 requests without even checking, if the url actually exists or target site is actually a wordpress site.
22+
An ideal example of this would be when [bruteforcing wordpress login](https://cloud.projectdiscovery.io/public/wordpress-weak-credentials) with default usernames and passwords, but if we carefully re-evaluate this template, we can see that template is sending 276 requests without even checking, if the url actually exists or the target site is actually a wordpress site.
2323

24-
With addition of flow in Nuclei v3 we can re-write this template to first check if target is a wordpress site, if yes then bruteforce login with default credentials and this can be achieved by simply adding one line of content i.e `flow: http(1) && http(2)` and nuclei will take care of everything else.
24+
With addition of flow in Nuclei v3 we can re-write this template to first check if the target is a wordpress site, if yes then bruteforce login with default credentials and this can be achieved by simply adding one line of content i.e `flow: http(1) && http(2)` and nuclei will take care of everything else.
2525

2626
```yaml
2727
id: wordpress-bruteforce
@@ -63,7 +63,7 @@ http:
6363
condition: and
6464
```
6565
66-
The update template now seems straight forward and easy to understand. we are first checking if target is a wordpress site and then executing bruteforce requests. This is just a simple example of conditional execution and flow accepts any Javascript (ECMAScript 5.1) expression/code so you are free to craft any conditional execution logic you want.
66+
The update template now seems straight forward and easy to understand. we are first checking if the target is a wordpress site and then executing bruteforce requests. This is just a simple example of conditional execution and flow accepts any Javascript (ECMAScript 5.1) expression/code so you are free to craft any conditional execution logic you want.
6767
6868
## Request Execution Orchestration
6969
@@ -273,4 +273,4 @@ http:
273273
- 'status_code == 200'
274274
- '!contains(body, "Incorrect parameters")'
275275
condition: and
276-
```
276+
```

0 commit comments

Comments
 (0)