Skip to content

Commit

Permalink
Browse files Browse the repository at this point in the history
  • Loading branch information
antoninoLorenzo committed Jul 25, 2024
2 parents 661aac4 + a6b37a5 commit 6daaf93
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 5 deletions.
6 changes: 4 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,6 @@
![pylint](https://img.shields.io/badge/PyLint-8.74-yellow?logo=python&logoColor=white)
![pylint](https://img.shields.io/badge/PyLint-8.77-yellow?logo=python&logoColor=white)

🚧 *Under Development* 🚧

# AI-OPS

Expand Down Expand Up @@ -30,7 +32,7 @@

- 🎁 **Full Open-Source**: No need for third-party LLM providers; use any model you prefer with [Ollama](https://github.com/ollama/ollama).
- πŸ”§ **Tool Integration**: Execute common penetration testing tools or integrate new ones without needing to code in Python.
- πŸ“š **Up-to-date Knowledge**: Use the `RAG` system to keep the agent informed with the latest documents and data.
- πŸ“š **Up-to-date Knowledge**: Use the `RAG` system to keep the agent informed with the latest documents and data. (*Under Development*)
- βš™οΈ **Scalability**: Independently deployable components allow you to utilize any hardware setup.

<!--
Expand Down
5 changes: 2 additions & 3 deletions records/thm_agent_sudo.md
Original file line number Diff line number Diff line change
@@ -1,12 +1,11 @@
# Agent Sudo THM

The target machine is [Agent Sudo](https://tryhackme.com/r/room/agentsudoctf), a Linux machine, the tasks went from some
basic **Enumeration** to **FTP** access, **Image Stenography**; the last task was **Linux Privilege Escalation** based
The target machine is [Agent Sudo](https://tryhackme.com/r/room/agentsudoctf), a Linux machine; the tasks went from **Enumeration** to **FTP** access and **Image Stenography**. The last task was **Linux Privilege Escalation** based
on a <ins>sudo vulnerability</ins>.

## Reconnaissance
- ( 1 ) correctly proposed nmap and gobuster commands
- ( 0 ) proposed inspecting page, http headers, whois and (yielded no results)
- ( 0 ) proposed inspecting page, http headers and whois, it yielded no results
- ( 1 ) given the hint from the **CTF** it successfully found the ftp username

**Overall Usefulness**: it was quite useful for the third step, without AI-OPS I would have been blocked for a while.
Expand Down

0 comments on commit 6daaf93

Please sign in to comment.