NITE Team 4

NITE Team 4

データを表示:
Realistic Commands?
Hi! I just purchased this game hoping it would put some fun into cramming my face into textbooks. These commands, and I have only seen OSINTSCAN and sfuzzer yet, are they real or are they just similar to real commands?
< >
1-2 / 2 のコメントを表示
Anashel  [開発者] 2019年2月27日 18時54分 
It really depends on your pentest setup. Many will customized their own command and script.

Osintscan and Sfuzzer are inspired from various tools like DNSrecon and DNSenum in Kali. But I have to keep them simple in NT4 so it's still fun.

For example, if you want to do a dictionary attack using a wordlist on a domain name in dnsrecon, your command will be;
dnsrecon -d example.com -D /usr/share/wordlists/dnsmap.txt -t std --xml dnsrecon.xml

In NITE Team 4, we don't force you to setup a wordlist (-D) and let you simply use:
sfuzzer niteteam4.com -t 60

or If you are attacking an internal DNS:

sfuzzer niteteam4.com -t 60 -i

You still learn the principle of what is a dictionary attack and when to use them, but if you want to apply this in a security training courses, you will have to learn the command, and they will vary from one pentest platform to another. Not the concept and attack vector, but the exact string will be different.
very helpful
< >
1-2 / 2 のコメントを表示
ページ毎: 1530 50