diff --git a/docs/metasploit-framework.wiki/Committer-Keys.md b/docs/metasploit-framework.wiki/Committer-Keys.md index 7917565f23..b060433e7d 100644 --- a/docs/metasploit-framework.wiki/Committer-Keys.md +++ b/docs/metasploit-framework.wiki/Committer-Keys.md @@ -106,7 +106,7 @@ Enter passphrase: [...] 2. Modify your `.git/config` file to enable signing commits and merges by default: -```` +```ini [user] name = Your Name email = your_email@example.com @@ -114,7 +114,7 @@ Enter passphrase: [...] [alias] c = commit -S --edit m = merge -S --no-ff --edit -```` +``` Using `git c` and `git m` from now on will sign every commit with your `DEADBEEF` key. However, note that rebasing or cherry-picking commits will change the commit hash, and therefore, unsign the commit -- to resign the most recent, use `git c --amend`. diff --git a/docs/metasploit-framework.wiki/Creating-Metasploit-Framework-LoginScanners.md b/docs/metasploit-framework.wiki/Creating-Metasploit-Framework-LoginScanners.md index 2ee70e2e69..f626382849 100644 --- a/docs/metasploit-framework.wiki/Creating-Metasploit-Framework-LoginScanners.md +++ b/docs/metasploit-framework.wiki/Creating-Metasploit-Framework-LoginScanners.md @@ -147,7 +147,7 @@ This method is just a stub on the Base mixin. It will be overridden in each Logi For an example let's look at the attempt_login method from `Metasploit::Framework::LoginScanner::FTP (lib/metasploit/framework/login_scanner/ftp.rb)` - ```ruby +```ruby # (see Base#attempt_login) def attempt_login(credential) result_options = { @@ -170,7 +170,7 @@ def attempt_login(credential) ::Metasploit::Framework::LoginScanner::Result.new(result_options) end - ``` +``` ### scan! diff --git a/docs/metasploit-framework.wiki/How-To-Use-Plugins.md b/docs/metasploit-framework.wiki/How-To-Use-Plugins.md index 082166dddc..72b16c1b66 100644 --- a/docs/metasploit-framework.wiki/How-To-Use-Plugins.md +++ b/docs/metasploit-framework.wiki/How-To-Use-Plugins.md @@ -59,7 +59,7 @@ The current available plugins for Metasploit can be found by running the `load - The Alias plugin adds the ability to alias console commands: -``` +```msf msf6 > load alias [*] Successfully loaded plugin: alias msf6 > alias -h @@ -87,7 +87,7 @@ Proxies => http:localhost:8079 Viewing registered aliases: -``` +```msf msf6 > alias Current Aliases diff --git a/docs/metasploit-framework.wiki/How-to-log-in-Metasploit.md b/docs/metasploit-framework.wiki/How-to-log-in-Metasploit.md index efeafd81ad..1857119d24 100644 --- a/docs/metasploit-framework.wiki/How-to-log-in-Metasploit.md +++ b/docs/metasploit-framework.wiki/How-to-log-in-Metasploit.md @@ -38,7 +38,7 @@ For debugging purposes, it's always better to turn on the highest level of loggi There are mainly five logging methods you will most likely be using a lot, and they all have the exact same arguments. Let's use one of the logging methods to explain what these arguments are about: -``` +```ruby def elog(msg, src = 'core', level = 0, from = caller) ``` diff --git a/docs/metasploit-framework.wiki/How-to-obfuscate-JavaScript-in-Metasploit.md b/docs/metasploit-framework.wiki/How-to-obfuscate-JavaScript-in-Metasploit.md index c08d11fa60..c473d678f4 100644 --- a/docs/metasploit-framework.wiki/How-to-obfuscate-JavaScript-in-Metasploit.md +++ b/docs/metasploit-framework.wiki/How-to-obfuscate-JavaScript-in-Metasploit.md @@ -50,7 +50,7 @@ And then you are ready to go. The first thing you do with ObfuscateJS is you need to initialize it with the JavaScript you want to obfuscate, so in this case, begin like the following: -``` +```ruby js = %Q| var arrr = new Array(); arrr[0] = windows.document.createElement("img"); @@ -82,7 +82,7 @@ So if I want to obfuscate the variable ```arrr```, and I want to obfuscate the s In some cases, you might actually want to know the obfuscated version of a symbol name. One scenario is calling a JavaScript function from an element's event handler, such as this: -``` +```html