This improves the recognition as to what attack the user wants to run when specifying the -a parameter. It is now case insensitive and allows to omit the generic endings like 'attack' or exploit'. Thus it is now for example possible to run the EternalBlueExploit by just setting -a eternalblue or running a DDoSAttack using -a ddos. This does not change any behavior regarding parameters or execution of multiple attacks.
Also introduced is better error feedback, meaning that when making a typo, ID2T now recommends the most likely attack that was initially meant and a hint to use the -l parameter for an overview of all attacks. When no sufficiently matching attack name was found it just prompts the user to use the -l parameter.
This should all be future proof as well, since it runs the user input against a dynamically created list of available attacks like the aforementioned attack overview already does.
This improves the recognition as to what attack the user wants to run when specifying the -a parameter. It is now case insensitive and allows to omit the generic endings like 'attack' or exploit'. Thus it is now for example possible to run the EternalBlueExploit by just setting -a eternalblue or running a DDoSAttack using -a ddos. This does not change any behavior regarding parameters or execution of multiple attacks.
Also introduced is better error feedback, meaning that when making a typo, ID2T now recommends the most likely attack that was initially meant and a hint to use the -l parameter for an overview of all attacks. When no sufficiently matching attack name was found it just prompts the user to use the -l parameter.
This should all be future proof as well, since it runs the user input against a dynamically created list of available attacks like the aforementioned attack overview already does.
This improves the recognition as to what attack the user wants to run when specifying the -a parameter. It is now case insensitive and allows to omit the generic endings like 'attack' or exploit'. Thus it is now for example possible to run the EternalBlueExploit by just setting -a eternalblue or running a DDoSAttack using -a ddos. This does not change any behavior regarding parameters or execution of multiple attacks.
Also introduced is better error feedback, meaning that when making a typo, ID2T now recommends the most likely attack that was initially meant and a hint to use the -l parameter for an overview of all attacks. When no sufficiently matching attack name was found it just prompts the user to use the -l parameter.
This should all be future proof as well, since it runs the user input against a dynamically created list of available attacks like the aforementioned attack overview already does.
The changes look great. Good idea implementing keyword recommendations for unrecognized attacks.