From a02164e78d37c9cca489becb339c3efe26664201 Mon Sep 17 00:00:00 2001 From: Zouhair AMAZZAL Date: Mon, 12 Aug 2024 23:36:01 +0300 Subject: [PATCH] CON-3040 docs: fix languages issues --- subjects/cybersecurity/osint-master/README.md | 3 +-- subjects/cybersecurity/osint-master/audit/README.md | 4 ++-- 2 files changed, 3 insertions(+), 4 deletions(-) diff --git a/subjects/cybersecurity/osint-master/README.md b/subjects/cybersecurity/osint-master/README.md index 9fd9dfb85..0d9c2d503 100644 --- a/subjects/cybersecurity/osint-master/README.md +++ b/subjects/cybersecurity/osint-master/README.md @@ -25,7 +25,6 @@ Some useful resources: - [Open-source intelligence](https://en.wikipedia.org/wiki/Open-source_intelligence) - [Doxing](https://en.wikipedia.org/wiki/Doxing) -- [Kali Tools - Recon](https://en.kali.tools/all/?category=recon) - [OSINT Tools on GitHub](https://github.com/topics/osint-tools) Before asking for help, ask yourself if you have really thought about all the possibilities. @@ -67,7 +66,7 @@ The tool should accept the following inputs: `Full Name`, `IP Address`, `Usernam Enumerate subdomains and gather information including IP addresses, SSL certificate details, and potential vulnerabilities. Identify potential subdomain takeover risks by analyzing DNS records and associated resources. -> You are responsible for choosing the way you want to find the data and for using the API's. be aware of the API's `Terms of Use` and `Cost` before use! +> You are responsible for choosing the way you want to find the data and for using the APIs. Be aware of the API's `Terms of Use` and `Cost` before use! #### Output Management: diff --git a/subjects/cybersecurity/osint-master/audit/README.md b/subjects/cybersecurity/osint-master/audit/README.md index d612be036..1feca4241 100644 --- a/subjects/cybersecurity/osint-master/audit/README.md +++ b/subjects/cybersecurity/osint-master/audit/README.md @@ -20,7 +20,7 @@ Suggested role play questions include: - Explain what subdomain takeovers are, and how to protect against it? - How does the OSINT-Master tool help identify sensitive information? - What challenges did you face while developing the OSINT-Master tool and how did you address them? -- How can we protect our crytical information from OSINT techniques? +- How can we protect our critical information from OSINT techniques? - How can this tool help in a defensive approach? ###### Were the student able to answer all the questions? @@ -59,7 +59,7 @@ $> osintmaster -n "Full Name" -o filename ###### Does the output stored to the file specified in the output parameter? -3. **IP Adress Option:** +3. **IP Address Option:** ```sh $> osintmaster -i "IP Address" -o filename