Skip to content

Commit

Permalink
Merge pull request #7718 from onizenso/user-guide
Browse files Browse the repository at this point in the history
Minor spelling and grammar fixes
  • Loading branch information
andresriancho committed Jan 23, 2015
2 parents 6768422 + cff15e3 commit ac98bef
Show file tree
Hide file tree
Showing 3 changed files with 5 additions and 5 deletions.
6 changes: 3 additions & 3 deletions doc/sphinx/advanced-exploitation.rst
Original file line number Diff line number Diff line change
Expand Up @@ -55,8 +55,8 @@ The following is a console dump from w3af scanning a vulnerable application, exp
- [0] <shell object (rsystem: "*nix")>
Please use the interact command to interact with the shell objects.
w3af/exploit>>> interact 0
Execute "end_interaction" to get out of the remote shell. Commands typed in this menu will be
runned through the local_file_reader shell
Execute "end_interaction" to get out of the remote shell. Commands typed in this menu will
run through the local_file_reader shell
w3af/exploit/local_file_reader-0>>> payload list_processes
...
PID NAME STATUS CMD
Expand Down Expand Up @@ -129,7 +129,7 @@ Now that we know the theory, let's see an example of what this feature can do:
Please use the interact command to interact with the shell objects.
w3af/exploit>>> interact 0
Execute "end_interaction" to get out of the remote shell.
Commands typed in this menu will be runned on the remote web server.
Commands typed in this menu will run on the remote web server.
w3af/exploit/os_commanding-0>>>
Nothing really new until now, we configured w3af, started the scan and exploited the vulnerability.
Expand Down
2 changes: 1 addition & 1 deletion doc/sphinx/exploitation.rst
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ During the scan vulnerabilities are found and stored in specific locations of th
Please use the interact command to interact with the shell objects.
w3af/exploit>>> interact 0
Execute "end_interaction" to get out of the remote shell.
Commands typed in this menu will be runned on the remote web server.
Commands typed in this menu will run on the remote web server.
w3af/exploit/os_commanding-0>>> ls
v.php
v2.php
Expand Down
2 changes: 1 addition & 1 deletion doc/sphinx/phases.rst
Original file line number Diff line number Diff line change
Expand Up @@ -58,7 +58,7 @@ Analyze HTTP requests and responses which are sent by other plugins and identify

Output
------
Are the way the framework and plugins communicate with the user. Output plugins save the data to a text, xml or html file. Debugging information is also sent to the output plugins and can be saved for analysis.
The way the framework and plugins communicate with the user. Output plugins save the data to a text, xml or html file. Debugging information is also sent to the output plugins and can be saved for analysis.

Messages sent to the output manager are sent to all enabled plugins, so if you have enabled ``text_file`` and ``xml_file`` output plugins, both will log any vulnerabilities found by an audit plugin.

Expand Down

0 comments on commit ac98bef

Please sign in to comment.