Skip to content

Commit

Permalink
CON-3103 docs(pentest-kit) improve the subject quality
Browse files Browse the repository at this point in the history
  • Loading branch information
zamazzal committed Aug 24, 2024
1 parent 757fbb9 commit f9d9881
Show file tree
Hide file tree
Showing 2 changed files with 8 additions and 2 deletions.
6 changes: 4 additions & 2 deletions subjects/cybersecurity/pentest-kit/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,11 +6,11 @@

### Introduction:

Penetration testing (pen-testing) is a critical process in cybersecurity, involving the use of specialized tools to identify and exploit vulnerabilities in systems and networks. Pentest tools are essential for conducting thorough security assessments, helping to safeguard against potential threats.
Penetration testing (Pentesting) is a critical process in cybersecurity, involving the use of specialized tools to identify and exploit vulnerabilities in systems and networks. Pentest tools are essential for conducting thorough security assessments, helping to safeguard against potential threats.

### Objective:

Using a programming language from your choice you will create a a multi-functional tool for penetration testing, similar to popular security tools like `Nmap`, and `Dirsearch`. This project aims to give hands-on experience in understanding and developing security tools and building a practical toolkit for various pen-testing tasks.
Using a programming language from your choice you will create a multi-functional tool for penetration testing, similar to popular security tools like `Nmap`, and `Dirsearch`. This project aims to give hands-on experience in understanding and developing security tools and building a practical toolkit for various Pentesting tasks.

By completing this project, You will:

Expand Down Expand Up @@ -64,6 +64,8 @@ You will develop the following tools:
4. **HeaderGrabber:**
- Implement a tool that retrieves and analyzes HTTP headers from a web server.

> All the tools must be built from scratch. Calling existing or external CLI will not be considered a valid solution in the audit!
#### Input Handling:

Each tool should accept the relevant input parameters, such as IP addresses, URLs, and port ranges.
Expand Down
4 changes: 4 additions & 0 deletions subjects/cybersecurity/pentest-kit/audit/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -99,6 +99,10 @@ $> pentestkit -g http://example.com -o result4.txt

4. **Usability:** Are the tools user-friendly and well-documented?

> You can compare the results of the student's tool with another tool to to prove the output match with the expected one if needed!
###### Are all the tools implemented from scratch? Can you confirm that no external CLI are called to perform the checks described in the subject?

###### Did the tool design and implementation align with all the project requirements above?

###### Were the students able to implement functional and reliable tools that meet the project requirements?
Expand Down

0 comments on commit f9d9881

Please sign in to comment.