Browse Source

CON-3040 docs: fix languages issues

CON-3116-Fix-nascar-online-alpha-subject-and-audit
Zouhair AMAZZAL 1 month ago committed by Zouhair AMAZZAL
parent
commit
a02164e78d
  1. 3
      subjects/cybersecurity/osint-master/README.md
  2. 4
      subjects/cybersecurity/osint-master/audit/README.md

3
subjects/cybersecurity/osint-master/README.md

@ -25,7 +25,6 @@ Some useful resources:
- [Open-source intelligence](https://en.wikipedia.org/wiki/Open-source_intelligence) - [Open-source intelligence](https://en.wikipedia.org/wiki/Open-source_intelligence)
- [Doxing](https://en.wikipedia.org/wiki/Doxing) - [Doxing](https://en.wikipedia.org/wiki/Doxing)
- [Kali Tools - Recon](https://en.kali.tools/all/?category=recon)
- [OSINT Tools on GitHub](https://github.com/topics/osint-tools) - [OSINT Tools on GitHub](https://github.com/topics/osint-tools)
Before asking for help, ask yourself if you have really thought about all the possibilities. Before asking for help, ask yourself if you have really thought about all the possibilities.
@ -67,7 +66,7 @@ The tool should accept the following inputs: `Full Name`, `IP Address`, `Usernam
Enumerate subdomains and gather information including IP addresses, SSL certificate details, and potential vulnerabilities. Enumerate subdomains and gather information including IP addresses, SSL certificate details, and potential vulnerabilities.
Identify potential subdomain takeover risks by analyzing DNS records and associated resources. Identify potential subdomain takeover risks by analyzing DNS records and associated resources.
> You are responsible for choosing the way you want to find the data and for using the API's. be aware of the API's `Terms of Use` and `Cost` before use! > You are responsible for choosing the way you want to find the data and for using the APIs. Be aware of the API's `Terms of Use` and `Cost` before use!
#### Output Management: #### Output Management:

4
subjects/cybersecurity/osint-master/audit/README.md

@ -20,7 +20,7 @@ Suggested role play questions include:
- Explain what subdomain takeovers are, and how to protect against it? - Explain what subdomain takeovers are, and how to protect against it?
- How does the OSINT-Master tool help identify sensitive information? - How does the OSINT-Master tool help identify sensitive information?
- What challenges did you face while developing the OSINT-Master tool and how did you address them? - What challenges did you face while developing the OSINT-Master tool and how did you address them?
- How can we protect our crytical information from OSINT techniques? - How can we protect our critical information from OSINT techniques?
- How can this tool help in a defensive approach? - How can this tool help in a defensive approach?
###### Were the student able to answer all the questions? ###### Were the student able to answer all the questions?
@ -59,7 +59,7 @@ $> osintmaster -n "Full Name" -o filename
###### Does the output stored to the file specified in the output parameter? ###### Does the output stored to the file specified in the output parameter?
3. **IP Adress Option:** 3. **IP Address Option:**
```sh ```sh
$> osintmaster -i "IP Address" -o filename $> osintmaster -i "IP Address" -o filename

Loading…
Cancel
Save