Skip to content

Commit 9752e93

Browse files
committed
wording and headings
1 parent d1238b8 commit 9752e93

18 files changed

Lines changed: 269 additions & 143 deletions

src/content/docs/modules/ble.mdx

Lines changed: 18 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -7,40 +7,42 @@ sidebar:
77

88
import { YouTube } from "astro-embed";
99

10-
This module is responsible for Bluetooth Low Energy devices discovery, services enumeration and characteristic writing for unauthenticated devices.
10+
This module handles **Bluetooth Low Energy** (BLE) devices.
11+
It provides device discovery, services enumeration, and characteristic writing for unauthenticated devices.
1112

1213
:::caution
1314
This module is not supported on Microsoft Windows and Apple macOS [due to this bug](https://github.com/bettercap/bettercap/issues/74).
1415

1516
:::
1617

17-
### Commands
18+
## Commands
1819

19-
#### `ble.recon on`
20+
### `ble.recon on`
2021

21-
Start Bluetooth Low Energy devices discovery.
22+
Start **BLE device discovery**.
2223

23-
#### `ble.recon off`
24+
### `ble.recon off`
2425

25-
Stop Bluetooth Low Energy devices discovery.
26+
Stop **BLE device discovery**.
2627

27-
#### `ble.clear`
28+
### `ble.clear`
2829

29-
Clear all devices collected by the BLE discovery module.
30+
Clear all devices collected by the **BLE discovery** module.
3031

31-
#### `ble.show`
32+
### `ble.show`
3233

33-
Show discovered Bluetooth Low Energy devices.
34+
Show discovered **BLE devices**.
3435

35-
#### `ble.enum MAC`
36+
### `ble.enum MAC`
3637

37-
Enumerate services and characteristics for the given BLE device.
38+
Enumerate **services and characteristics** for the given BLE device.
3839

39-
#### `ble.write MAC UUID HEX_DATA`
40+
### `ble.write MAC UUID HEX_DATA`
4041

41-
Write the `HEX_DATA` buffer to the BLE device with the specified `MAC` address, to the characteristics with the given `UUID`. |
42+
Write the `HEX_DATA` buffer to the BLE device with the specified `MAC`.
43+
Writes to the characteristic with the given `UUID`.
4244

43-
### Parameters
45+
## Parameters
4446

4547
| Parameter | Default | Description |
4648
| ----------------- | ---------- | ------------------------------------------------------------------------------------------------ |
@@ -51,7 +53,7 @@ Write the `HEX_DATA` buffer to the BLE device with the specified `MAC` address,
5153
| `ble.timeout` | `5` | Connection timeout in seconds. |
5254
| `ble.ttl` | `30` | Seconds of inactivity for a device to be pruned. |
5355

54-
### Examples
56+
## Examples
5557

5658
Connect, enumerate and read characteristics from the BLE device `04:52:de:ad:be:ef` (requires `ble.recon on` first):
5759

src/content/docs/modules/core/api.rest.md

Lines changed: 17 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -11,33 +11,38 @@ The default credentials are:
1111

1212
:::
1313

14-
A RESTful API server to orchestrate and interact with the current interactive session, starts on HTTP and unauthenticated by default, can be switched to HTTPS and basic auth by using the proper parameters.
14+
A **RESTful API server** for orchestrating and interacting with the current interactive session.
15+
16+
By default, it starts on **HTTP** and is **unauthenticated**.
17+
You can switch to **HTTPS** and enable **basic auth** using the proper parameters.
1518

1619
## Commands
1720

1821
### `api.rest on`
1922

20-
Start the REST API server.
23+
Start the **REST API** server.
2124

2225
### `api.rest off`
2326

24-
Stop the REST API server.
27+
Stop the **REST API** server.
2528

2629
### `api.rest.record FILENAME`
2730

28-
Start polling the rest API periodically recording each sample in a compressed file that can be later replayed.
31+
Start polling the **REST API** periodically.
32+
Records each sample in a **compressed file** that can be replayed later.
2933

3034
### `api.rest.record off`
3135

32-
Stop recording the session.
36+
Stop **recording** the session.
3337

3438
### `api.rest.replay FILENAME`
3539

36-
Start the rest API module in replay mode using `FILENAME` as the recorded session file, will revert to normal mode once the replay is over.
40+
Start the REST API module in **replay mode** using `FILENAME`.
41+
Reverts to normal mode once the replay is over.
3742

3843
### `api.rest.replay off`
3944

40-
Stop replaying the recorded session.
45+
Stop **replaying** the recorded session.
4146

4247
## Parameters
4348

@@ -61,17 +66,18 @@ Stop replaying the recorded session.
6166

6267
## Routes
6368

64-
Clients can authenticate using HTTP basic authentication, these are the available API routes.
69+
Clients can authenticate using **HTTP basic authentication**.
70+
These are the available API routes:
6571

6672
### `GET /api/file?name=FILENAME`
6773

6874
Get a file on the host
6975

7076
### `GET /api/events`
7177

72-
{{% notice note %}}
73-
This route will be available as a websocket endpoint instead of normal HTTP if the `api.rest.websocket` parameter is set to true.
74-
{{% /notice %}}
78+
:::note
79+
This route becomes a **websocket endpoint** instead of normal HTTP if `api.rest.websocket` is set to `true`.
80+
:::
7581

7682
Return a list of events ( the optional `n` GET parameter will limit the number ):
7783

src/content/docs/modules/core/ticker.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,21 +3,22 @@ title: ticker
33
description: The ticker module can be used to execute a given set of commands periodically in the interactive session.
44
---
55

6-
The ticker module can be used to execute a given set of commands periodically in the interactive session.
6+
The **ticker module** executes a given set of commands periodically in the interactive session.
77

88
## Commands
99

1010
### `ticker on`
1111

12-
Start the main ticker.
12+
Start the **main ticker**.
1313

1414
### `ticker off`
1515

16-
Stop the main ticker.
16+
Stop the **main ticker**.
1717

1818
### `ticker.create NAME PERIOD COMMANDS`
1919

20-
Create and start a named ticker called `NAME` that will execute the given `COMMANDS` every `PERIOD`.
20+
Create and start a **named ticker** called `NAME`.
21+
Executes `COMMANDS` every `PERIOD` seconds.
2122

2223
### `ticker.destroy NAME`
2324

src/content/docs/modules/ethernet/net.recon.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,33 +5,36 @@ sidebar:
55
order: 2
66
---
77

8-
This module is responsible for periodically reading the system ARP table in order to detect new hosts on the network.
8+
This module periodically reads the system **ARP table** to detect new hosts on the network.
99

1010
## Commands
1111

1212
### `net.recon on`
1313

14-
Start network hosts discovery.
14+
Start **network hosts discovery**.
1515

1616
### `net.recon off`
1717

18-
Stop network hosts discovery.
18+
Stop **network hosts discovery**.
1919

2020
### `net.clear`
2121

22-
Clear all endpoints collected by the hosts discovery module.
22+
Clear all endpoints collected by the **hosts discovery** module.
2323

2424
### `net.show`
2525

26-
Show cache hosts list (default sorting by ip).
26+
Show cached hosts list.
27+
Default sorting by IP.
2728

2829
### `net.show ADDRESS1, ADDRESS2`
2930

30-
Show information about a specific list of addresses (by IP or MAC).
31+
Show information about specific addresses.
32+
Accepts IP or MAC.
3133

3234
### `net.show.meta ADDRESS1, ADDRESS2`
3335

34-
Show metadata (mDNS, UPnP, open ports, etc) about a specific list of addresses (by IP or MAC).
36+
Show metadata about specific addresses.
37+
Includes mDNS, UPnP, open ports, etc.
3538

3639
## Parameters
3740

src/content/docs/modules/ethernet/net.sniff.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,31 +5,32 @@ sidebar:
55
order: 4
66
---
77

8-
This module is a network packet sniffer and fuzzer supporting both [BPF syntax](http://biot.com/capstats/bpf.html) and regular expressions for filtering.
8+
A **network packet sniffer** and **fuzzer** module.
9+
Supports both [BPF syntax](http://biot.com/capstats/bpf.html) and regular expressions for filtering.
910

10-
It is also able to dissect several major protocols in order to harvest credentials.
11+
It can also **dissect major protocols** to harvest credentials.
1112

1213
## Commands
1314

1415
### `net.sniff on`
1516

16-
Start the packet sniffer.
17+
Start the **packet sniffer**.
1718

1819
### `net.sniff off`
1920

20-
Stop the packet sniffer.
21+
Stop the **packet sniffer**.
2122

2223
### `net.sniff stats`
2324

24-
Print the packet sniffer session configuration and statistics.
25+
Print sniffer session configuration and statistics.
2526

2627
### `net.fuzz on`
2728

28-
Enable fuzzing for every sniffed packet containing the specified layers.
29+
Enable **fuzzing** for sniffed packets containing specified layers.
2930

3031
### `net.fuzz off`
3132

32-
Disable fuzzing.
33+
Disable **fuzzing**.
3334

3435
## Parameters
3536

src/content/docs/modules/ethernet/proxies/http.proxy.md

Lines changed: 24 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -3,17 +3,20 @@ title: http.proxy
33
description: A full featured HTTP transparent proxy that can be scripted using JavaScript modules.
44
---
55

6-
A full featured HTTP transparent proxy that can be scripted using JavaScript modules. If used together with a [spoofer](/modules/ethernet/spoofers/introduction/), all HTTP traffic will be redirected to it and it will automatically handle port redirections as needed.
6+
A **transparent HTTP proxy** with **JavaScript scripting** support.
7+
8+
When used with a [spoofer](/modules/ethernet/spoofers/introduction/), all **HTTP traffic** redirects to this proxy.
9+
Port redirections are handled automatically.
710

811
## Commands
912

1013
### `http.proxy on`
1114

12-
Start the HTTP proxy.
15+
Start the **HTTP proxy** server.
1316

1417
### `http.proxy off`
1518

16-
Stop the HTTP proxy.
19+
Stop the **HTTP proxy** server.
1720

1821
## Parameters
1922

@@ -31,7 +34,8 @@ Stop the HTTP proxy.
3134

3235
## Modules
3336

34-
The `http.proxy` and `https.proxy` modules can be scripted using javascript files that must declare at least one of the following functions:
37+
The `http.proxy` and `https.proxy` modules can be scripted using **JavaScript files**.
38+
These files must declare at least one of the following functions:
3539

3640
```js
3741
// called when the script is loaded
@@ -70,7 +74,10 @@ function onCommand(cmd) {
7074
}
7175
```
7276

73-
Modules can change the `req` request and `res` response objects, for instance the [web-override.cap caplet](https://github.com/bettercap/caplets/blob/master/web-override/web-override.cap) is using the `onRequest` function in order to override every request before it is executed with a fake response:
77+
Modules can change the `req` request and `res` response objects.
78+
79+
For instance, the [web-override.cap caplet](https://github.com/bettercap/caplets/blob/master/web-override/web-override.cap) uses the `onRequest` function.
80+
It overrides every request before execution with a **fake response**:
7481

7582
```js
7683
function onRequest(req, res) {
@@ -86,7 +93,8 @@ function onRequest(req, res) {
8693
}
8794
```
8895

89-
The [login-man-abuse.cap caplet](https://github.com/bettercap/caplets/blob/master/login-manager-abuse/login-man-abuse.cap) instead will use the `onResponse` handler to inject its malicious javascript file in every html response:
96+
The [login-man-abuse.cap caplet](https://github.com/bettercap/caplets/blob/master/login-manager-abuse/login-man-abuse.cap) uses the `onResponse` handler.
97+
It injects a **JavaScript file** into every HTML response:
9098

9199
```js
92100
function onResponse(req, res) {
@@ -108,10 +116,10 @@ function onResponse(req, res) {
108116

109117
### Builtin Functions
110118

111-
The JS interpreter is [limited to ES5](https://github.com/robertkrimen/otto?tab=readme-ov-file#caveat-emptor) (no
112-
for/of, typed arrays, classes... )
119+
The JS interpreter is [limited to ES5](https://github.com/robertkrimen/otto?tab=readme-ov-file#caveat-emptor).
120+
This means **no** `for/of`, typed arrays, or classes.
113121

114-
Modules can use the following builtin functions.
122+
Modules can use the following **builtin functions**:
115123

116124
| Function | Description |
117125
| ------------------------------------------- | ----------------------------------------------------------------------------- |
@@ -141,7 +149,10 @@ Modules can use the following builtin functions.
141149

142150
## Examples
143151

144-
Will ARP spoof the whole network, enable sslstrip and inject a "Hello World" javascript alert to every HTML page being visited:
152+
### ARP Spoof with SSL Strip
153+
154+
This example **ARP spoofs** the whole network.
155+
It enables **SSL strip** and injects a JavaScript alert to every HTML page:
145156

146157
```bash
147158
set http.proxy.injectjs alert("Hello World")
@@ -151,7 +162,9 @@ http.proxy on
151162
arp.spoof on
152163
```
153164

154-
Only proxy requests for `cnn.com` (including subdomains):
165+
### Whitelist Specific Domains
166+
167+
Only proxy requests for `cnn.com` and its subdomains:
155168

156169
```bash
157170
set http.proxy.blacklist *

0 commit comments

Comments
 (0)