CON-3040 docs: fix languages issues

This commit is contained in:
Zouhair AMAZZAL 2024-08-12 23:36:01 +03:00 committed by Zouhair AMAZZAL
parent 4a9f3ab4de
commit a02164e78d
2 changed files with 3 additions and 4 deletions

View File

@ -25,7 +25,6 @@ Some useful resources:
- [Open-source intelligence](https://en.wikipedia.org/wiki/Open-source_intelligence) - [Open-source intelligence](https://en.wikipedia.org/wiki/Open-source_intelligence)
- [Doxing](https://en.wikipedia.org/wiki/Doxing) - [Doxing](https://en.wikipedia.org/wiki/Doxing)
- [Kali Tools - Recon](https://en.kali.tools/all/?category=recon)
- [OSINT Tools on GitHub](https://github.com/topics/osint-tools) - [OSINT Tools on GitHub](https://github.com/topics/osint-tools)
Before asking for help, ask yourself if you have really thought about all the possibilities. Before asking for help, ask yourself if you have really thought about all the possibilities.
@ -67,7 +66,7 @@ The tool should accept the following inputs: `Full Name`, `IP Address`, `Usernam
Enumerate subdomains and gather information including IP addresses, SSL certificate details, and potential vulnerabilities. Enumerate subdomains and gather information including IP addresses, SSL certificate details, and potential vulnerabilities.
Identify potential subdomain takeover risks by analyzing DNS records and associated resources. Identify potential subdomain takeover risks by analyzing DNS records and associated resources.
> You are responsible for choosing the way you want to find the data and for using the API's. be aware of the API's `Terms of Use` and `Cost` before use! > You are responsible for choosing the way you want to find the data and for using the APIs. Be aware of the API's `Terms of Use` and `Cost` before use!
#### Output Management: #### Output Management:

View File

@ -20,7 +20,7 @@ Suggested role play questions include:
- Explain what subdomain takeovers are, and how to protect against it? - Explain what subdomain takeovers are, and how to protect against it?
- How does the OSINT-Master tool help identify sensitive information? - How does the OSINT-Master tool help identify sensitive information?
- What challenges did you face while developing the OSINT-Master tool and how did you address them? - What challenges did you face while developing the OSINT-Master tool and how did you address them?
- How can we protect our crytical information from OSINT techniques? - How can we protect our critical information from OSINT techniques?
- How can this tool help in a defensive approach? - How can this tool help in a defensive approach?
###### Were the student able to answer all the questions? ###### Were the student able to answer all the questions?
@ -59,7 +59,7 @@ $> osintmaster -n "Full Name" -o filename
###### Does the output stored to the file specified in the output parameter? ###### Does the output stored to the file specified in the output parameter?
3. **IP Adress Option:** 3. **IP Address Option:**
```sh ```sh
$> osintmaster -i "IP Address" -o filename $> osintmaster -i "IP Address" -o filename