diff options
| author | mo khan <mo@mokhan.ca> | 2016-02-12 21:40:36 -0700 |
|---|---|---|
| committer | mo khan <mo@mokhan.ca> | 2016-02-12 21:40:36 -0700 |
| commit | e7287115279c51d012a1ff0e02d9dbcd13bf6288 (patch) | |
| tree | cfa66fdfafaacb7cb018373946b98e587c105ca7 | |
| parent | e9393f5b1de5625351226372d6c18ada3cca647c (diff) | |
fix captions.
| -rw-r--r-- | report/template.tex | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/report/template.tex b/report/template.tex index c6ed765..d7ebaaf 100644 --- a/report/template.tex +++ b/report/template.tex @@ -167,7 +167,7 @@ page. \begin{figure}[h!] \includegraphics[width=\linewidth]{images/dvwa-xss-page-exploit.png} - \caption{XSS Page.} + \caption{XSS Page Exploit.} \label{fig:xss-page2} \end{figure} @@ -449,7 +449,7 @@ to exploit db to get the details for this vulnerability. \begin{figure}[h!] \includegraphics[width=\linewidth]{images/wp-exploitdb.png} - \caption{wordpress sqlinjection exploit.} + \caption{Wordpress SQL injection exploit.} \label{fig:wordpress1} \end{figure} @@ -459,7 +459,7 @@ Then I crafted the url to exploit the SQL injection vulnerability. \begin{figure}[h!] \includegraphics[width=\linewidth]{images/wp-admin-credentials.png} - \caption{wordpress sql injection admin credentials.} + \caption{Wordpress SQL injection admin credentials.} \label{fig:wordpress2} \end{figure} @@ -476,7 +476,7 @@ I then took the MD5 hash for the admin account and looked up the reversed value \begin{figure}[h!] \includegraphics[width=\linewidth]{images/wp-admin-md5.png} - \caption{wordpress reverse md5 hash.} + \caption{Wordpress reverse md5 hash.} \label{fig:wordpress3} \end{figure} @@ -485,7 +485,7 @@ Next I logged in to the wordpress site. \begin{figure}[h!] \includegraphics[width=\linewidth]{images/wp-logged-in.png} - \caption{wordpress dashboard.} + \caption{Wordpress dashboard.} \label{fig:wordpress4} \end{figure} @@ -527,7 +527,7 @@ Then click on Tomcat Manager and enter the default credentials. \begin{figure}[h!] \includegraphics[width=\linewidth]{images/tomcat-metasploitable-credentials.png} - \caption{Default Tomcat install.} + \caption{Default Tomcat credentials.} \label{fig:tomcat-injection2} \end{figure} @@ -544,7 +544,7 @@ particular case I opted to use a laudanum cmd.war file. \begin{figure}[h!] \includegraphics[width=\linewidth]{images/tomcat-metasploitable-upload.png} - \caption{Upload war file to Tomcat.} + \caption{Upload WAR file to Tomcat.} \label{fig:tomcat-injection4} \end{figure} @@ -966,7 +966,7 @@ The results from the nessus scan are below: \begin{figure}[h!] \includegraphics[width=\linewidth]{images/nessus-metasploitable.png} - \caption{Nessus Scan on metasploitable.sait230.ca.} + \caption{Nessus scan on metasploitable.sait230.ca.} \label{fig:nessus-metasploitable} \end{figure} @@ -1029,7 +1029,7 @@ The results from the nessus scan are below: \begin{figure}[h!] \includegraphics[width=\linewidth]{images/nessus-tomcat.png} - \caption{Nessus Scan on tomcat-apache.sait230.ca} + \caption{Nessus scan on tomcat-apache.sait230.ca} \label{fig:nessus-tomcat} \end{figure} |
