Skip to content

Commit a910f38

Browse files
committed
land rapid7#8029 syntax fixes for some docs
2 parents a8c6a91 + 8197d14 commit a910f38

File tree

3 files changed

+20
-19
lines changed

3 files changed

+20
-19
lines changed

documentation/modules/auxiliary/admin/chromecast/chromecast_youtube.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
This module plays (by default) [https://www.youtube.com/watch?v=kxopViU98Xo]("Epic sax guy 10 hours") on a target Google Chromecast via YouTube.
1+
This module plays (by default) ["Epic sax guy 10 hours"](https://www.youtube.com/watch?v=kxopViU98Xo) on a target Google Chromecast via YouTube.
22

33
Naturally, audio should be cranked to 11 before running this module.
44

@@ -12,7 +12,7 @@ Naturally, audio should be cranked to 11 before running this module.
1212

1313
**VID**
1414

15-
The YouTube video to be played. Defaults to [https://www.youtube.com/watch?v=kxopViU98Xo](kxopViU98Xo)
15+
The YouTube video to be played. Defaults to [kxopViU98Xo](https://www.youtube.com/watch?v=kxopViU98Xo)
1616

1717
## Sample Output
1818

documentation/modules/auxiliary/admin/http/netgear_soap_password_extractor.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,18 @@
11
## Vulnerable Application
22

33
The following list is a non-exhaustive list of vulnerable Netgear devices:
4-
1. R6300v2 < [1.0.3.28](http://kb.netgear.com/app/answers/detail/a_id/28372)
5-
2. WNDR3300 - V1.0.45 (current, confirmed vuln)
6-
3. WNDR3700v1 - 1.0.7.98, 1.0.16.98 (confirmed vuln)
7-
4. WNDR3700v2 - 1.0.1.14 (EOL, confirmed vuln)
8-
5. WNDR3700v4 < [1.0.2.80](http://kb.netgear.com/app/answers/detail/a_id/28355)
9-
6. WNDR3800 - 1.0.0.48 (EOL, confirmed vuln)
10-
7. WNDR4300 < [1.0.2.80](http://kb.netgear.com/app/answers/detail/a_id/28037)
11-
8. WNR1000v2 - 1.0.1.1, 1.1.2.58 (EOL, confirmed vuln)
12-
9. WNR2000v3 < [1.1.2.12](http://kb.netgear.com/app/answers/detail/a_id/30024)
13-
10. WNR2200 < [1.0.1.96](http://kb.netgear.com/app/answers/detail/a_id/28036)
14-
11. WNR2500 < [1.0.0.32](http://kb.netgear.com/app/answers/detail/a_id/28351)
4+
5+
1. R6300v2 < [1.0.3.28](http://kb.netgear.com/app/answers/detail/a_id/28372)
6+
2. WNDR3300 - V1.0.45 (current, confirmed vuln)
7+
3. WNDR3700v1 - 1.0.7.98, 1.0.16.98 (confirmed vuln)
8+
4. WNDR3700v2 - 1.0.1.14 (EOL, confirmed vuln)
9+
5. WNDR3700v4 < [1.0.2.80](http://kb.netgear.com/app/answers/detail/a_id/28355)
10+
6. WNDR3800 - 1.0.0.48 (EOL, confirmed vuln)
11+
7. WNDR4300 < [1.0.2.80](http://kb.netgear.com/app/answers/detail/a_id/28037)
12+
8. WNR1000v2 - 1.0.1.1, 1.1.2.58 (EOL, confirmed vuln)
13+
9. WNR2000v3 < [1.1.2.12](http://kb.netgear.com/app/answers/detail/a_id/30024)
14+
10. WNR2200 < [1.0.1.96](http://kb.netgear.com/app/answers/detail/a_id/28036)
15+
11. WNR2500 < [1.0.0.32](http://kb.netgear.com/app/answers/detail/a_id/28351)
1516

1617
## Verification Steps
1718

documentation/modules/exploit/linux/local/bpf_priv_esc.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
## Notes
22

3-
This module (and the original exploit) are written in several parts: hello, doubleput, and suidhelper.
3+
This module (and the original exploit) are written in several parts: `hello`, `doubleput`, and `suidhelper`.
44

5-
Mettle at times on this exploit will give back an invalid session number error. In these cases payload/linux/x64/shell/bind_tcp seemed to always work.
5+
Mettle at times on this exploit will give back an invalid session number error. In these cases `payload/linux/x64/shell/bind_tcp` seemed to always work.
66

7-
As of PR submission, the original shell becomes unresposive when the root shell occurs. Metasm fails to compile due to fuse.h being required.
7+
As of PR submission, the original shell becomes unresposive when the root shell occurs. Metasm fails to compile due to `fuse.h` being required.
88

9-
As of PR submission, killing of the process hello and doubleput has to occur manually. /tmp/fuse_mount also needs to be unmounted and deleted.
9+
As of PR submission, killing of the process `hello` and `doubleput` has to occur manually. `/tmp/fuse_mount` also needs to be unmounted and deleted.
1010

1111
## Creating A Testing Environment
1212

1313
There are a few requirements for this module to work:
1414

15-
1. CONFIG_BPF_SYSCALL=y must be set in the kernel (default on Ubuntu 16.04 (Linux 4.4.0-38-generic))
16-
2. kernel.unprivileged_bpf_disabled can't be set to 1 (default on Ubuntu 16.04 (Linux 4.4.0-38-generic))
15+
1. `CONFIG_BPF_SYSCALL=y` must be set in the kernel (default on Ubuntu 16.04 (Linux 4.4.0-38-generic))
16+
2. `kernel.unprivileged_bpf_disabled` can't be set to `1` (default on Ubuntu 16.04 (Linux 4.4.0-38-generic))
1717
3. fuse needs to be installed (non-default on Ubuntu 16.04 (Linux 4.4.0-38-generic))
1818

1919
Using Ubuntu 16.04, simply `sudo apt-get install fuse` and you're all set!

0 commit comments

Comments
 (0)