diff --git a/docs/metasploit-framework.wiki/Pivoting-in-Metasploit.md b/docs/metasploit-framework.wiki/Pivoting-in-Metasploit.md index a7f953afb3..9330e0c735 100644 --- a/docs/metasploit-framework.wiki/Pivoting-in-Metasploit.md +++ b/docs/metasploit-framework.wiki/Pivoting-in-Metasploit.md @@ -444,7 +444,7 @@ Now edit the `proxychains` configuration file located at `/etc/proxychains.conf` socks5 127.0.0.1 1080 ``` -The final final should look something like this: +The final file should look something like this: ```ini # proxychains.conf VER 3.1 @@ -567,7 +567,7 @@ index.html 100%[===========================>] 57.34K --.-KB/s i ``` ### Scanning -For scanning with Nmap, Zenmap, Nessus and others, keep in mind that ICMP and UPD traffic cannot tunnel through the proxy. So you cannot perform ping or UDP scans. +For scanning with Nmap, Zenmap, Nessus and others, keep in mind that ICMP and UDP traffic cannot tunnel through the proxy. So you cannot perform ping or UDP scans. For Nmap and Zenmap, the below example shows the commands can be used. It is best to be selective on ports to scan since scanning through the proxy tunnel can be slow.