summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authormo khan <mo@mokhan.ca>2016-02-15 11:39:50 -0700
committermo khan <mo@mokhan.ca>2016-02-15 11:39:50 -0700
commit85b41abf5c509709f45ec7b8f3621f826686f65d (patch)
treed3dbbc4ecb9dddef90e5496229dcbd07b044c8a6
parente7287115279c51d012a1ff0e02d9dbcd13bf6288 (diff)
fix typos.
-rw-r--r--report/template.tex6
1 files changed, 3 insertions, 3 deletions
diff --git a/report/template.tex b/report/template.tex
index d7ebaaf..0e6381e 100644
--- a/report/template.tex
+++ b/report/template.tex
@@ -70,7 +70,7 @@ The following methodology was used:
\begin{description}
\item[Information Gathering] During this phase of the test we identify the hosts on the network. Then we enumerate open ports and services. We attempt to identify operating systems and versions of services running on each of the hosts. We attempt to identify possible vulnerabilities to gain access to hosts or identify information that could help us move to the next phase.
\item[Passive Intelligence] In this phase we attempt to gather indirect information such as whois information.
- \item[Exploitation] During this phase we attempt to exploit vulnerabilities and/or identify services to reach the highest level or privileges allowable.
+ \item[Exploitation] During this phase we attempt to exploit vulnerabilities and/or identify services to reach the highest level of privileges allowable.
\item[Post Exploitation] We document and report all findings during the previous steps.
\end{description}
@@ -112,8 +112,8 @@ of key web applications and user data.
\begin{enumerate}
\item DVWA Cross Site Scripting
- \item DVWA SQL Injection.
- \item Root access to MySQL server.
+ \item DVWA SQL Injection
+ \item Root access to MySQL server
\item Vulnerable Wordpress Spreadsheet Plugin
\item Default Tomcat Installation
\end{enumerate}