mirror of https://github.com/01-edu/public.git
Zouhair AMAZZAL
2 months ago
committed by
Zouhair AMAZZAL
2 changed files with 67 additions and 19 deletions
@ -1,76 +1,107 @@ |
|||||||
#### General |
#### General |
||||||
|
|
||||||
##### Check the Repo content. |
##### Check the Repo content. |
||||||
|
|
||||||
Files that must be inside the repository: |
Files that must be inside the repository: |
||||||
|
|
||||||
- Detailed documentation in the `README.md` file. |
- Detailed documentation in the `README.md` file. |
||||||
- Source code for the OSINT-Master tool. |
- Source code for the OSINT-Master tool. |
||||||
- Any required configuration files and scripts for running the tool. |
- Any required configuration files and scripts for running the tool. |
||||||
|
|
||||||
###### Are all the required files present? |
###### Are all the required files present? |
||||||
|
|
||||||
##### Play the role of a stakeholder |
##### Play the role of a stakeholder |
||||||
|
|
||||||
Organize a simulated scenario where the student take on the role of Cyber Security Experts and explain their solution and knowledge to a team or stakeholder. Evaluate their grasp of the concepts and technologies used in the project, their communication efficacy, and their critical thinking about their solution and knowledge behind this project. |
Organize a simulated scenario where the student take on the role of Cyber Security Experts and explain their solution and knowledge to a team or stakeholder. Evaluate their grasp of the concepts and technologies used in the project, their communication efficacy, and their critical thinking about their solution and knowledge behind this project. |
||||||
Suggested role play questions include: |
Suggested role play questions include: |
||||||
|
|
||||||
- What is OSINT and why is it significant in cybersecurity? |
- What is OSINT and why is it significant in cybersecurity? |
||||||
- What types of information can be gathered using OSINT techniques? |
- What types of information can be gathered using OSINT techniques? |
||||||
- Explain what subdomain takeovers are, and how to protect against it? |
- Explain what subdomain takeovers are, and how to protect against it? |
||||||
- How does the OSINT-Master tool help in identifying sensitive information? |
- How does the OSINT-Master tool help identify sensitive information? |
||||||
- What challenges did you face while developing the OSINT-Master tool and how did you address them? |
- What challenges did you face while developing the OSINT-Master tool and how did you address them? |
||||||
- How we can protect our cretical information from OSINT techniques? |
- How can we protect our crytical information from OSINT techniques? |
||||||
- How can this tool help in a defensive approach? |
- How can this tool help in a defensive approach? |
||||||
|
|
||||||
###### Were the student able to answer all the questions? |
###### Were the student able to answer all the questions? |
||||||
|
|
||||||
###### Did the student demonstrate a thorough understanding of the concepts and technologies used in the project? |
###### Did the student demonstrate a thorough understanding of the concepts and technologies used in the project? |
||||||
###### Were the student able to communicate effectively and justify their decisions and explain the knowledge behind this project? |
|
||||||
###### Did the student able to evalute the value of this project in the real life scenarios? |
###### Were the students able to communicate effectively and justify their decisions and explain the knowledge behind this project? |
||||||
|
|
||||||
|
###### Was the student able to evaluate the value of this project in real-life scenarios? |
||||||
|
|
||||||
###### Did the students demonstrate an understanding of ethical and legal considerations related to OSINT? |
###### Did the students demonstrate an understanding of ethical and legal considerations related to OSINT? |
||||||
|
|
||||||
##### Check the Student Documentation in the `README.md` File |
##### Check the Student Documentation in the `README.md` File |
||||||
|
|
||||||
###### Does the `README.md` file contain all the necessary information about the tool (prerequisites, setup, configuration, usage, ...)? |
###### Does the `README.md` file contain all the necessary information about the tool (prerequisites, setup, configuration, usage, ...)? |
||||||
|
|
||||||
###### Does the `README.md` file contain clear guidelines and warnings about the ethical and legal use of the tool? |
###### Does the `README.md` file contain clear guidelines and warnings about the ethical and legal use of the tool? |
||||||
|
|
||||||
##### Review the Tool's Design and Implementation |
##### Review the Tool's Design and Implementation |
||||||
1. **Help Command:** |
|
||||||
|
1. **Help Command:** |
||||||
|
|
||||||
```sh |
```sh |
||||||
$> osintmaster --help |
$> osintmaster --help |
||||||
``` |
``` |
||||||
|
|
||||||
###### Does the output include explanation how to use the tool? |
###### Does the output include explanation how to use the tool? |
||||||
|
|
||||||
2. **Full Name Option:** |
2. **Full Name Option:** |
||||||
|
|
||||||
```sh |
```sh |
||||||
$> osintmaster -n "Full Name" -o filename |
$> osintmaster -n "Full Name" -o filename |
||||||
``` |
``` |
||||||
|
|
||||||
###### Does the output include accurate details such as phone numbers, addresses, and social media profiles? |
###### Does the output include accurate details such as phone numbers, addresses, and social media profiles? |
||||||
|
|
||||||
###### Does the output stored to the file specified in the output parameter? |
###### Does the output stored to the file specified in the output parameter? |
||||||
|
|
||||||
3. **IP Adress Option:** |
3. **IP Adress Option:** |
||||||
|
|
||||||
```sh |
```sh |
||||||
$> osintmaster -i "IP Address" -o filename |
$> osintmaster -i "IP Address" -o filename |
||||||
``` |
``` |
||||||
|
|
||||||
###### Does the output include geolocation data, ISP details, and historical data? |
###### Does the output include geolocation data, ISP details, and historical data? |
||||||
|
|
||||||
###### Does the output stored to the file specified in the output parameter? |
###### Does the output stored to the file specified in the output parameter? |
||||||
|
|
||||||
4. **Username Option:** |
4. **Username Option:** |
||||||
|
|
||||||
```sh |
```sh |
||||||
$> osintmaster -u "Username" -o filename |
$> osintmaster -u "Username" -o filename |
||||||
``` |
``` |
||||||
|
|
||||||
###### Does the output check the presence of the username on multiple social networks and public repositories? |
###### Does the output check the presence of the username on multiple social networks and public repositories? |
||||||
|
|
||||||
###### Does the output stored to the file specified in the output parameter? |
###### Does the output stored to the file specified in the output parameter? |
||||||
|
|
||||||
5. **Domain Option:** |
5. **Domain Option:** |
||||||
|
|
||||||
```sh |
```sh |
||||||
$> osintmaster -d "Domain" -o filename |
$> osintmaster -d "Domain" -o filename |
||||||
``` |
``` |
||||||
|
|
||||||
###### Does the output enumerate subdomains, gather relevant information, and identify potential subdomain takeover risks? |
###### Does the output enumerate subdomains, gather relevant information, and identify potential subdomain takeover risks? |
||||||
|
|
||||||
###### Does the output stored to the file specified in the output parameter? |
###### Does the output stored to the file specified in the output parameter? |
||||||
|
|
||||||
##### Ensure that the student submission meets the project requirements: |
##### Ensure that the student submission meets the project requirements: |
||||||
|
|
||||||
1. **Functionality:** Does the tool retrieve detailed information based on the given inputs (Full Name, IP Address, Username, and Domain)? |
1. **Functionality:** Does the tool retrieve detailed information based on the given inputs (Full Name, IP Address, Username, and Domain)? |
||||||
2. **Data Accuracy:** Is the retrieved information accurate and relevant? |
2. **Data Accuracy:** Is the retrieved information accurate and relevant? |
||||||
3. **Ethical Considerations:** Are there clear guidelines and warnings about the ethical and legal use of the tool? |
3. **Ethical Considerations:** Are there clear guidelines and warnings about the ethical and legal use of the tool? |
||||||
4. **Usability:** Is the tool user-friendly and well-documented? |
4. **Usability:** Is the tool user-friendly and well-documented? |
||||||
|
|
||||||
###### Did the tool design and implementation align with all the project requirements above? |
###### Did the tool design and implementation align with all the project requirements above? |
||||||
|
|
||||||
###### Were the students able to implement a functional and reliable tool that meets the project requirements? |
###### Were the students able to implement a functional and reliable tool that meets the project requirements? |
||||||
|
|
||||||
#### Bonus |
#### Bonus |
||||||
|
|
||||||
###### + Did the student implement additional valuable features? |
###### + Did the student implement additional valuable features? |
||||||
###### + Is this project an outstanding project that exceeds the basic requirements? |
|
||||||
|
###### + Is this project an outstanding project that exceeds the basic requirements? |
||||||
|
Loading…
Reference in new issue