diff --git a/documentation/modules/auxiliary/analyze/apply_pot.md b/documentation/modules/auxiliary/analyze/apply_pot.md index fcd236270f..913df02623 100644 --- a/documentation/modules/auxiliary/analyze/apply_pot.md +++ b/documentation/modules/auxiliary/analyze/apply_pot.md @@ -1,6 +1,6 @@ ## Vulnerable Application - This module applys a john the ripper (or hashcat) style .pot file to hashes in the database. + This module applies a john the ripper (or hashcat) style .pot file to hashes in the database. This will allow very fast cracking of all supported hash types which have already been cracked. ## Verification Steps diff --git a/documentation/modules/auxiliary/scanner/http/dir_listing.md b/documentation/modules/auxiliary/scanner/http/dir_listing.md index 79027fdeab..9d345229e4 100644 --- a/documentation/modules/auxiliary/scanner/http/dir_listing.md +++ b/documentation/modules/auxiliary/scanner/http/dir_listing.md @@ -17,7 +17,7 @@ These instructions will create a web sever using `apache` with directory listing #### Note -ake sure you dont have an `index.html` file in your `/var/www/html` for the vulnerability to work. +Make sure you dont have an `index.html` file in your `/var/www/html` for the vulnerability to work. ## Verification Steps