Table decoration does not appear

Steps to reproduce

I pasted the copied table, but it doesn't show up as a table. Also, below it, the use of a code block or header is not valid.

Did you follow the troubleshooting guide? [Y/N]

Expected result

Should show the table and below should apply the decoration

Actual result

Table decoration does not appear, and it is also impossible to apply styles to the text below the table

Environment

SYSTEM INFO:
Obsidian version: v1.3.7
Installer version: v1.3.5
Operating system: Windows 10 Pro 10.0.22621
Login status: not logged in
Insider build toggle: off
Live preview: on
Legacy editor: off
Base theme: dark
Community theme: none
Snippets enabled: 0
Restricted mode: off
Plugins installed: 6
Plugins enabled: 4
1: Obsidian markdown export v1.0.10
2: File Tree Alternative Plugin v2.3.5
3: Editor Syntax Highlight v0.1.3
4: Highlightr v1.2.2

RECOMMENDATIONS:
Community plugins: for bugs, please first try updating all your plugins to latest. If still not fixed, please try to make the issue happen in the Sandbox Vault or disable community plugins.


Additional information

I don’t understand what you are trying to do. Moved to help.

Could you copy the content of the table and paste it in a code block format here?

Obsidian is parsing the < and > characters as HTML tags, which is messing up your table formatting. What you want to do to fix that is add a pair of backticks ` around the first cell in each row

Obsidian_rBTCSboWIK

LINE 92:


Below is a mini cheatsheet:

|Command|Description|
|---|---|
|hydra -P -v|Brute force against a protocol of your choice|
|hydra -v -V -u -L -P -t 1 -u|You can use Hydra to bruteforce usernames as well as passwords. It will loop through every combination in your lists. (-vV = verbose mode, showing login attempts)|
|hydra -t 1 -V -f -l -P rdp://|Attack a Windows Remote Desktop with a password list.|
|hydra -l -P . $ip -V http-form-post '/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log In&testcookie=1:S=Location'|Craft a more specific request for Hydra to brute force.|

Below is a mini cheatsheet:

Command Description
hydra -P -v Brute force against a protocol of your choice
hydra -v -V -u -L -P -t 1 -u You can use Hydra to bruteforce usernames as well as passwords. It will loop through every combination in your lists. (-vV = verbose mode, showing login attempts)
hydra -t 1 -V -f -l -P rdp:// Attack a Windows Remote Desktop with a password list.
hydra -l -P . $ip -V http-form-post ‘/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log In&testcookie=1:S=Location’ Craft a more specific request for Hydra to brute force.
1 Like

This topic was automatically closed 90 days after the last reply. New replies are no longer allowed.