summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authormo khan <mo@mokhan.ca>2016-02-12 21:40:36 -0700
committermo khan <mo@mokhan.ca>2016-02-12 21:40:36 -0700
commite7287115279c51d012a1ff0e02d9dbcd13bf6288 (patch)
treecfa66fdfafaacb7cb018373946b98e587c105ca7
parente9393f5b1de5625351226372d6c18ada3cca647c (diff)
fix captions.
-rw-r--r--report/template.tex18
1 files changed, 9 insertions, 9 deletions
diff --git a/report/template.tex b/report/template.tex
index c6ed765..d7ebaaf 100644
--- a/report/template.tex
+++ b/report/template.tex
@@ -167,7 +167,7 @@ page.
\begin{figure}[h!]
\includegraphics[width=\linewidth]{images/dvwa-xss-page-exploit.png}
- \caption{XSS Page.}
+ \caption{XSS Page Exploit.}
\label{fig:xss-page2}
\end{figure}
@@ -449,7 +449,7 @@ to exploit db to get the details for this vulnerability.
\begin{figure}[h!]
\includegraphics[width=\linewidth]{images/wp-exploitdb.png}
- \caption{wordpress sqlinjection exploit.}
+ \caption{Wordpress SQL injection exploit.}
\label{fig:wordpress1}
\end{figure}
@@ -459,7 +459,7 @@ Then I crafted the url to exploit the SQL injection vulnerability.
\begin{figure}[h!]
\includegraphics[width=\linewidth]{images/wp-admin-credentials.png}
- \caption{wordpress sql injection admin credentials.}
+ \caption{Wordpress SQL injection admin credentials.}
\label{fig:wordpress2}
\end{figure}
@@ -476,7 +476,7 @@ I then took the MD5 hash for the admin account and looked up the reversed value
\begin{figure}[h!]
\includegraphics[width=\linewidth]{images/wp-admin-md5.png}
- \caption{wordpress reverse md5 hash.}
+ \caption{Wordpress reverse md5 hash.}
\label{fig:wordpress3}
\end{figure}
@@ -485,7 +485,7 @@ Next I logged in to the wordpress site.
\begin{figure}[h!]
\includegraphics[width=\linewidth]{images/wp-logged-in.png}
- \caption{wordpress dashboard.}
+ \caption{Wordpress dashboard.}
\label{fig:wordpress4}
\end{figure}
@@ -527,7 +527,7 @@ Then click on Tomcat Manager and enter the default credentials.
\begin{figure}[h!]
\includegraphics[width=\linewidth]{images/tomcat-metasploitable-credentials.png}
- \caption{Default Tomcat install.}
+ \caption{Default Tomcat credentials.}
\label{fig:tomcat-injection2}
\end{figure}
@@ -544,7 +544,7 @@ particular case I opted to use a laudanum cmd.war file.
\begin{figure}[h!]
\includegraphics[width=\linewidth]{images/tomcat-metasploitable-upload.png}
- \caption{Upload war file to Tomcat.}
+ \caption{Upload WAR file to Tomcat.}
\label{fig:tomcat-injection4}
\end{figure}
@@ -966,7 +966,7 @@ The results from the nessus scan are below:
\begin{figure}[h!]
\includegraphics[width=\linewidth]{images/nessus-metasploitable.png}
- \caption{Nessus Scan on metasploitable.sait230.ca.}
+ \caption{Nessus scan on metasploitable.sait230.ca.}
\label{fig:nessus-metasploitable}
\end{figure}
@@ -1029,7 +1029,7 @@ The results from the nessus scan are below:
\begin{figure}[h!]
\includegraphics[width=\linewidth]{images/nessus-tomcat.png}
- \caption{Nessus Scan on tomcat-apache.sait230.ca}
+ \caption{Nessus scan on tomcat-apache.sait230.ca}
\label{fig:nessus-tomcat}
\end{figure}