Skip to content

Commit 0c6a8c1

Browse files
authored
Merge pull request #20625 from h00die/fix_exploit_docs_options
Update exploit docs to use modern h3 for options instead of original spec (bold)
2 parents 0e8fd9c + b646e0e commit 0c6a8c1

File tree

181 files changed

+588
-449
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

181 files changed

+588
-449
lines changed

documentation/modules/exploit/aix/local/xorg_x11_server.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,11 +34,11 @@ This table lists all vulnerable Xorg versions:
3434

3535
## Options
3636

37-
**SESSION**
37+
### SESSION
3838

3939
Which session to use, which can be viewed with `sessions`
4040

41-
**WritableDir**
41+
### WritableDir
4242

4343
A writable directory file system path. (default: `/tmp`)
4444

documentation/modules/exploit/android/local/janus.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Number of signers: 1
7777

7878
## Options
7979

80-
**PACKAGE**
80+
### PACKAGE
8181

8282
Select a package to infect. A list of packages can be obtained by running `app_list` on meterpreter. Using `ALL` will
8383
loop through all packages and attempt to exploit them until successful. This can take a while, and cause lots of data to be

documentation/modules/exploit/freebsd/local/intel_sysret_priv_esc.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,11 +34,11 @@
3434

3535
## Options
3636

37-
**SESSION**
37+
### SESSION
3838

3939
Which session to use, which can be viewed with `sessions`
4040

41-
**WritableDir**
41+
### WritableDir
4242

4343
A writable directory file system path. (default: `/tmp`)
4444

documentation/modules/exploit/freebsd/local/rtld_execl_priv_esc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@
3131

3232
## Options
3333

34-
**SESSION**
34+
### SESSION
3535

3636
Which session to use, which can be viewed with `sessions`
3737

documentation/modules/exploit/linux/http/asuswrt_lan_rce.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525

2626
## Options
2727

28-
**ASUSWRTPORT**
28+
### ASUSWRTPORT
2929

3030
AsusWRT HTTP portal port (default: `80`)
3131

documentation/modules/exploit/linux/http/cisco_firepower_useradd.md

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -24,12 +24,22 @@ https://software.cisco.com/download/release.html?mdfid=286259687&softwareid=2862
2424

2525
## Options
2626

27-
**USERNAME** The username for Cisco Firepower Management console.
27+
### USERNAME
2828

29-
**PASSWORD** The password for Cisco Firepower Management console.
29+
The username for Cisco Firepower Management console.
3030

31-
**NEWSSHUSER** The SSH account to create. By default, this is random.
31+
### PASSWORD
3232

33-
**NEWSSHPASS** The SSH password for the new account. By default, this is also random.
33+
The password for Cisco Firepower Management console.
3434

35-
**SSHPORT** In case for some reason, the SSH changed, otherwise this is 22 by default.
35+
### NEWSSHUSER
36+
37+
The SSH account to create. By default, this is random.
38+
39+
### NEWSSHPASS
40+
41+
The SSH password for the new account. By default, this is also random.
42+
43+
### SSHPORT
44+
45+
In case for some reason, the SSH changed, otherwise this is 22 by default.

documentation/modules/exploit/linux/http/cisco_rv32x_rce.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -39,30 +39,30 @@ https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2
3939

4040
## Options
4141

42-
**RHOSTS**
42+
### RHOSTS
4343

4444
Configure the remote vulnerable system.
4545

46-
**RPORT**
46+
### RPORT
4747

4848
Configure the TCP port of the HTTP/HTTPS management web interface.
4949

50-
**USE_SSL**
50+
### USE_SSL
5151

5252
This flag controls whether the remote management web interface is accessible
5353
via HTTPS or not. Should be false for HTTP and true for HTTPS.
5454

55-
**PAYLOAD**
55+
### PAYLOAD
5656

5757
Configure the Metasploit payload that you want to stage. Must be for MIPS64
5858
arch. Set payload Options accordingly.
5959

60-
**SRVHOST**
60+
### SRVHOST
6161

6262
The module stages the payload via a web server. This is the binding interface
6363
IP. Default can be set to 0.0.0.0.
6464

65-
**HTTPDelay**
65+
### HTTPDelay
6666

6767
This configures how long the module should wait for the incoming HTTP
6868
connection to the HTTP stager.

documentation/modules/exploit/linux/http/craftcms_preauth_rce_cve_2025_32432.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -75,8 +75,10 @@ ddev launch
7575

7676
The module has the following option:
7777

78-
- **ASSET_ID**: This option is required for older versions of Craft CMS, particularly in the 3.x series.
79-
It specifies the asset ID for the Craft CMS instance. For 3.x versions, this ID must be set correctly to exploit the vulnerability.
78+
### ASSET_ID
79+
80+
This option is required for older versions of Craft CMS, particularly in the 3.x series.
81+
It specifies the asset ID for the Craft CMS instance. For 3.x versions, this ID must be set correctly to exploit the vulnerability.
8082

8183
For example, if you are targeting a Craft CMS version from the `>= 3.0.0`, `< 3.9.14`, make sure to specify the correct `ASSET_ID`.
8284
This is necessary for successful exploitation when dealing with these versions.

documentation/modules/exploit/linux/http/goahead_ldpreload.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ gcc ./cgitest.c -o cgi-bin/cgitest
3030

3131
## Options
3232

33-
**TARGET_URI**
33+
### TARGET_URI
3434

3535
Optional. The full path to a CGI endpoint on the target server.
3636

documentation/modules/exploit/linux/http/hp_van_sdn_cmd_inject.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,23 +18,23 @@ Tested on 2.7.18.0503.
1818

1919
## Options
2020

21-
**RPORT**
21+
### RPORT
2222

2323
Set this to the port for the REST API, usually 8081.
2424

25-
**WEBUI_PORT**
25+
### WEBUI_PORT
2626

2727
Set this to the port for the web UI, usually 8443.
2828

29-
**TOKEN**
29+
### TOKEN
3030

3131
Set this to the service token. Defaults to `AuroraSdnToken37`.
3232

33-
**USERNAME**
33+
### USERNAME
3434

3535
Set this to the service username. Defaults to `sdn`.
3636

37-
**PASSWORD**
37+
### PASSWORD
3838

3939
Set this to the service password. Defaults to `skyline`.
4040

0 commit comments

Comments
 (0)