Skip to content

Commit 0e62f3c

Browse files
authored
Land #18444, spelling fixes on docs
2 parents 6af8d3f + 7ffc1ca commit 0e62f3c

File tree

205 files changed

+307
-307
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

205 files changed

+307
-307
lines changed

documentation/modules/auxiliary/admin/aws/aws_launch_instances.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Shell #1:
2121
[*] instance i-12345678 status: initializing
2222
...
2323
[*] instance i-12345678 status: ok
24-
[*] Instance i-12345678 has IP adrress 35.12.4.1
24+
[*] Instance i-12345678 has IP address 35.12.4.1
2525
[*] Auxiliary module execution completed
2626
```
2727

@@ -56,7 +56,7 @@ can be made available by assigning an Internet routable IP address to a host or
5656
routing traffic to it through an ELB (Elastic Load Balancer). In either case
5757
security-groups are used to open access to network ranges and specific TPC/UDP
5858
ports. Security-groups provide much of the functionality of traditional firewalls
59-
and can be configured by specifyig a protocol, a CIDR and a port.
59+
and can be configured by specifying a protocol, a CIDR and a port.
6060

6161
## How it Works
6262

@@ -126,7 +126,7 @@ Advanced Options:
126126

127127
* `INSTANCE_TYPE`: The instance type
128128
* `MaxCount`: Maximum number of instances to launch
129-
* `MinCount`: Minumum number of instances to launch
129+
* `MinCount`: Minimum number of instances to launch
130130
* `ROLE_NAME`: The instance profile/role name
131131
* `RPORT:` AWS EC2 Endpoint TCP Port
132132
* `SEC_GROUP_ID`: the EC2 security group to use

documentation/modules/auxiliary/admin/dcerpc/icpr_cert.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ has the [KB5014754][KB5014754] patch applied and the REG_DWORD
127127
account with the specified UPN should be supplied as well. In November of 2023, Microsoft will change the default value
128128
of `StrongCertificateBindingEnforcement` to 2. If the server has the patch applied, the SID will be returned in the
129129
issued certificate which ensures that the required strong mapping is in place. If the strong mapping is required and the
130-
SID is not specified in the certificate, then Kerberos authentication wil fail with `KDC_ERR_CERTIFICATE_MISMATCH`.
130+
SID is not specified in the certificate, then Kerberos authentication will fail with `KDC_ERR_CERTIFICATE_MISMATCH`.
131131

132132
The user must know:
133133

documentation/modules/auxiliary/admin/http/cisco_7937g_ssh_privesc.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ ncasCb - Show detailed ncas information, related to either call services,
128128
uptime - Show phone uptime.
129129
appPrt - Show UI's call status.
130130
fntPrt - Show information about fonts available on phone.
131-
memtop - Shows the top poiter to current memory.
131+
memtop - Shows the top pointer to current memory.
132132
removeScheduledLogEntry - debug
133133
addScheduledLogEntry - debug
134134
fatalError - Simulate fatal error for the phone.
@@ -178,8 +178,8 @@ localePrintAll - localePrintAll
178178
ceShow - Show Client Engine Status
179179
180180
Commands 101 to 121:
181-
udiShow - Show Unique Device Indentifier
182-
show - Show Unique Device Indentifier
181+
udiShow - Show Unique Device Identifier
182+
show - Show Unique Device Identifier
183183
pbnShow - Display app & bootrom headers
184184
upr - Upgrade to a Rockpile Standalone Image
185185
upm - Upgrade to a Rockpile Manf Image
@@ -336,7 +336,7 @@ ncasCb - Show detailed ncas information, related to either call services,
336336
uptime - Show phone uptime.
337337
appPrt - Show UI's call status.
338338
fntPrt - Show information about fonts available on phone.
339-
memtop - Shows the top poiter to current memory.
339+
memtop - Shows the top pointer to current memory.
340340
removeScheduledLogEntry - debug
341341
addScheduledLogEntry - debug
342342
fatalError - Simulate fatal error for the phone.
@@ -386,8 +386,8 @@ localePrintAll - localePrintAll
386386
ceShow - Show Client Engine Status
387387
388388
Commands 101 to 121:
389-
udiShow - Show Unique Device Indentifier
390-
show - Show Unique Device Indentifier
389+
udiShow - Show Unique Device Identifier
390+
show - Show Unique Device Identifier
391391
pbnShow - Display app & bootrom headers
392392
upr - Upgrade to a Rockpile Standalone Image
393393
upm - Upgrade to a Rockpile Manf Image

documentation/modules/auxiliary/admin/http/typo3_news_module_sqli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ News module extensions v5.3.2 and earlier for TYPO3 contain an SQL injection vul
44

55
## Vulnerable Application
66

7-
In vulnerable versions of the news module for TYPO3, a filter for unsetting user specified values does not account for capitalization of the paramter name. This allows a user to inject values to an SQL query.
7+
In vulnerable versions of the news module for TYPO3, a filter for unsetting user specified values does not account for capitalization of the parameter name. This allows a user to inject values to an SQL query.
88

99
To exploit the vulnerability, the module generates requests and sets a value for `order` and `OrderByAllowed`, which gets passed to the SQL query. The requests are constructed to reorder the display of news articles based on a character matching. This allows a blind SQL injection to be performed to retrieve a username and password hash.
1010

@@ -28,7 +28,7 @@ The value for query parameter `id` of the page that the news extension is runnin
2828
- [ ] Enable the news extension
2929
- [ ] Import [vulnerable page](https://github.com/rapid7/metasploit-framework/files/1015777/T3D__2017-05-20_02-17-z.t3d.zip)
3030
- [ ] Enable page
31-
- [ ] Verify if page is visble to unauthenticated user and note the id
31+
- [ ] Verify if page is visible to unauthenticated user and note the id
3232
- [ ] `./msfconsole -q -x 'use auxiliary/admin/http/typo3_news_module_sqli; set rhost <rhost>; set id <id>; run'`
3333
- [ ] Username and password hash should have been retrieved
3434

documentation/modules/auxiliary/admin/kerberos/get_ticket.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ Default is `true`.
7878

7979
This option is only used when requesting a TGS.
8080

81-
The Kerberos TGT to use when requesting the sevice ticket. If unset, the database will be checked'
81+
The Kerberos TGT to use when requesting the service ticket. If unset, the database will be checked'
8282

8383
## Scenarios
8484

documentation/modules/auxiliary/admin/kerberos/keytab.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ Export Kerberos encryption keys stored in the Metasploit database to a keytab fi
6363
# Secrets dump
6464
msf6 > use auxiliary/gather/windows_secrets_dump
6565
msf6 auxiliary(gather/windows_secrets_dump) > run smbuser=Administrator smbpass=p4$$w0rd rhosts=192.168.123.13
66-
... ommitted ...
66+
... omitted ...
6767
# Kerberos keys:
6868
Administrator:aes256-cts-hmac-sha1-96:56c3bf6629871a4e4b8ec894f37489e823bbaecc2a0a4a5749731afa9d158e01
6969
Administrator:aes128-cts-hmac-sha1-96:df990c21c4e8ea502efbbca3aae435ea
@@ -72,7 +72,7 @@ Administrator:des-cbc-crc:ad49d9d92f5da170
7272
krbtgt:aes256-cts-hmac-sha1-96:e1c5500ffb883e713288d8037651821b9ecb0dfad89e01d1b920fe136879e33c
7373
krbtgt:aes128-cts-hmac-sha1-96:ba87b2bc064673da39f40d37f9daa9da
7474
krbtgt:des-cbc-md5:3ddf2f627c4cbcdc
75-
... ommitted ...
75+
... omitted ...
7676
[*] Auxiliary module execution completed
7777
7878
# Export to keytab
@@ -94,7 +94,7 @@ Keytab entries
9494
1 18 (AES256) [email protected] e1c5500ffb883e713288d8037651821b9ecb0dfad89e01d1b920fe136879e33c 1970-01-01 01:00:00 +0100
9595
1 17 (AES128) [email protected] ba87b2bc064673da39f40d37f9daa9da 1970-01-01 01:00:00 +0100
9696
1 3 (DES_CBC_MD5) [email protected] 3ddf2f627c4cbcdc 1970-01-01 01:00:00 +0100
97-
... ommitted ...
97+
... omitted ...
9898
[*] Auxiliary module execution completed
9999
```
100100

@@ -168,7 +168,7 @@ tgs-req
168168
^^^^^^^^^^^^^^ authenticator value now decrypted using the previously generated keytab file
169169
```
170170

171-
If you have exported the `krbtgt` account to the keytab file - Wireshark will also decrypt the TGT ticket itsel. If not - Wireshark
171+
If you have exported the `krbtgt` account to the keytab file - Wireshark will also decrypt the TGT ticket itself. If not - Wireshark
172172
will generate warnings about being unable to decrypt the TGT ticket which is signed using the krbtgt account.
173173

174174
Additional details: https://wiki.wireshark.org/Kerberos

documentation/modules/auxiliary/admin/ldap/ad_cs_cert_template.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,11 +56,11 @@ The file format is determined by the extension so the file must end in either `.
5656

5757
#### The JSON format
5858
The JSON file format is a hash with attribute name keys and ASCII-hex encoded values. These files are compatible with
59-
[`Certipy`'s][certipy] `template` command. This module uses the JSON file format when storing copies fo certificate to
59+
[`Certipy`'s][certipy] `template` command. This module uses the JSON file format when storing copies of certificate to
6060
disk.
6161

6262
#### The YAML format
63-
The YAML file format is similiar to the JSON file format, but takes advantage of YAML's ability to include comments.
63+
The YAML file format is similar to the JSON file format, but takes advantage of YAML's ability to include comments.
6464
The file consists of a hash with attribute name keys and value strings. The `nTSecurityDescriptor` file can be either
6565
a binary string representing a literal value, or a security descriptor defined in Microsoft's [Security Descriptor
6666
Definition Language (SDDL)][sddl]. Premade configuration templates provided by Metasploit use this format.

documentation/modules/auxiliary/admin/ldap/rbcd.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Grant Write privileges for sandy to the target machine, i.e. `WS01`:
3232
$TargetComputer = Get-ADComputer 'WS01'
3333
$User = Get-ADUser 'sandy'
3434
35-
# Add GenericWrite access to the user against the target coputer
35+
# Add GenericWrite access to the user against the target computer
3636
$Rights = [System.DirectoryServices.ActiveDirectoryRights] "GenericWrite"
3737
$ControlType = [System.Security.AccessControl.AccessControlType] "Allow"
3838
$InheritanceType = [System.DirectoryServices.ActiveDirectorySecurityInheritance] "All"

documentation/modules/auxiliary/analyze/crack_databases.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -169,15 +169,15 @@ creds add user:mssql_foo hash:0x0100A607BA7C54A24D17B565C59F1743776A10250F581D48
169169
creds add user:mssql12_Password1! hash:0x0200F733058A07892C5CACE899768F89965F6BD1DED7955FE89E1C9A10E278$
170170
creds add user:mysql_probe hash:445ff82636a7ba59 jtr:mysql
171171
creds add user:mysql-sha1_tere hash:*5AD8F88516BD021DD43F171E2C785C69F8E54ADB jtr:mysql-sha1
172-
## oracle (10) uses usernames in the hashing, so we can't overide that here
172+
## oracle (10) uses usernames in the hashing, so we can't override that here
173173
creds add user:simon hash:4F8BC1809CB2AF77 jtr:des,oracle
174174
creds add user:SYSTEM hash:9EEDFA0AD26C6D52 jtr:des,oracle
175175
## oracle 11/12 H value, username is used
176176
creds add user:DEMO hash:'S:8F2D65FB5547B71C8DA3760F10960428CD307B1C6271691FC55C1F56554A;H:DC9894A01797$
177177
## oracle 11/12 uses a LONG format, see lib/msf/core/auxiliary/jtr.rb
178178
creds add user:oracle11_epsilon hash:'S:8F2D65FB5547B71C8DA3760F10960428CD307B1C6271691FC55C1F56554A;H:$
179179
creds add user:oracle12c_epsilon hash:'H:DC9894A01797D91D92ECA1DA66242209;T:E3243B98974159CC24FD2C9A8B3$
180-
##postgres uses username, so we can't overide that here
180+
##postgres uses username, so we can't override that here
181181
creds add user:example postgres:md5be86a79bf2043622d58d5453c47d4860
182182
creds add user:example postgres:md5be86a79bf20fake2d58d5453c47d4860
183183
echo "" > /root/.msf4/john.pot

documentation/modules/auxiliary/client/telegram/send_message.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Module options (auxiliary/client/telegram/send_message):
5353
BOT_TOKEN yes Telegram BOT token
5454
CHAT_ID no Chat ID for the BOT
5555
DOCUMENT no The path to the document(binary, video etc)
56-
FORMATTING Markdown no Message formating option (Markdown|MarkdownV2|HTML) (Accepted: Markdown, MarkdownV2, HT
56+
FORMATTING Markdown no Message formatting option (Markdown|MarkdownV2|HTML) (Accepted: Markdown, MarkdownV2, HT
5757
ML)
5858
IDFILE no File containing chat IDs, one per line
5959
MESSAGE no The message to be sent

0 commit comments

Comments
 (0)