H1 Header - Main Title
This is a test post to showcase all markdown formatting capabilities in the Deltron Zero terminal interface.
H2 Header - Section Title
This section demonstrates various text formatting options and content types.
H3 Header - Subsection
Regular paragraph text with bold text, italic text, and bold italic text. You can also use inline code within sentences.
H4 Header - Minor Section
Even smaller headers work great for detailed breakdowns.
H5 Header - Deep Dive
And we can go deeper if needed.
H6 Header - Maximum Depth
This is the smallest header available in markdown.
Text Formatting Examples
Bold Statement: This text is important and draws attention.
Italic Emphasis: This text has subtle emphasis.
Combined Bold and Italic: Maximum emphasis for critical information.
Strikethrough text for corrections or deprecated info.
Blockquote Section: This is a blockquote that can span multiple lines. Perfect for highlighting important quotes or notes.
You can even have multiple paragraphs in a blockquote.
Lists and Organization
Unordered List
- First item in the list
- Second item with some details
- Nested item level 1
- Another nested item
- Even deeper nesting level 2
- Back to main level
- Final item
Ordered List
- First step in the process
- Second step with explanation
- Third step breakdown:
- Sub-step A
- Sub-step B
- Sub-step C
- Fourth and final step
Task List
- Completed task
- Another completed item
- Pending task
- Future work item
Code Examples
Inline Code
Use the ls -la command to list directory contents, or run sudo apt update for system updates.
Code Block - Python
# Python example - Exploit scanner
import socket
import sys
def scan_port(target, port):
try:
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
sock.settimeout(1)
result = sock.connect_ex((target, port))
if result == 0:
print(f"[+] Port {port} is OPEN")
sock.close()
except Exception as e:
print(f"[-] Error: {e}")
# Scan common ports
target = "192.168.1.1"
for port in [21, 22, 80, 443, 3389]:
scan_port(target, port)
Code Block - Bash
#!/bin/bash
# Security audit script
echo "[*] Starting security audit..."
# Check for listening ports
echo "[+] Checking open ports:"
netstat -tuln | grep LISTEN
# Check for suspicious processes
echo "[+] Checking processes:"
ps aux | grep -E 'suspicious|malware'
# Review SSH logs
echo "[+] Recent SSH attempts:"
tail -20 /var/log/auth.log | grep ssh
echo "[*] Audit complete!"
Code Block - JavaScript
// XSS Detection example
function detectXSS(input) {
const dangerousPatterns = [
/<script\b[^<]*(?:(?!<\/script>)<[^<]*)*<\/script>/gi,
/javascript:/gi,
/on\w+\s*=/gi
];
for (let pattern of dangerousPatterns) {
if (pattern.test(input)) {
console.log('[!] XSS pattern detected!');
return true;
}
}
return false;
}
// Test the function
const userInput = '<script>alert("XSS")</script>';
detectXSS(userInput);
Tables
Basic Table
| Protocol | Port | Status | Notes |
|---|---|---|---|
| SSH | 22 | OPEN | Secure access |
| HTTP | 80 | OPEN | Web traffic |
| HTTPS | 443 | OPEN | Encrypted web |
| FTP | 21 | CLOSED | Disabled |
| RDP | 3389 | FILTERED | Firewalled |
Aligned Table
| Tool | Purpose | Difficulty | Rating |
|---|---|---|---|
| Nmap | Port Scanning | Easy | ⭐⭐⭐⭐⭐ |
| Metasploit | Exploitation | Medium | ⭐⭐⭐⭐ |
| Burp Suite | Web Testing | Medium | ⭐⭐⭐⭐⭐ |
| Wireshark | Packet Analysis | Hard | ⭐⭐⭐⭐ |
Links and References
External Links
Check out these resources:
Internal Navigation
See also:
Images
Remote Image (From URL)
Caption: Modern cybersecurity infrastructure
Placeholder Image
Caption: Network topology visualization
Another Example
Special Formatting
Horizontal Rules
Use horizontal rules to separate sections:
Escape Characters
Use backslash to escape special characters: * _ ` # [ ]
HTML Elements (if supported)
Nested Complex Example
Here’s a complex nested structure:
- Main Security Phase
- Reconnaissance
- Passive information gathering
whois example.com nslookup example.com - Active scanning
nmap -sV -sC target.com
- Passive information gathering
- Reconnaissance
- Exploitation Phase
Remember: Always have written authorization before testing!
- Vulnerability identification
- Exploit selection
- Payload delivery
- Post-Exploitation
- Establish persistence
- Privilege escalation
- Data exfiltration
- Cover tracks
Mathematical Notation
If supported: E = mc² or x² + y² = z²
Inline formula: The complexity is O(n log n).
Emoji Support 🔒
- 🔐 Security
- 🛡️ Defense
- 🔍 Investigation
- ⚠️ Warning
- ✅ Success
- ❌ Failed
- 💻 Computing
- 🌐 Network
Summary
This post demonstrates:
✓ All header levels (H1-H6)
✓ Text formatting (bold, italic, code)
✓ Lists (ordered, unordered, nested, tasks)
✓ Code blocks with syntax highlighting
✓ Tables with alignment
✓ Links (internal and external)
✓ Images (remote URLs)
✓ Blockquotes
✓ Horizontal rules
✓ Special characters
Transmission Status: COMPLETE
Data Integrity: VERIFIED
Classification: PUBLIC
[END_TRANSMISSION]