diff --git a/README.md b/README.md index 010dfb27..505cf12b 100644 --- a/README.md +++ b/README.md @@ -21,7 +21,7 @@ --- -**Interactsh** is an Open-Source Solution for Out of band Data Extraction, A tool designed to detect bugs that cause external interactions, For example - Blind SQLi, Blind CMDi, SSRF, etc. +**Interactsh** is an open-source tool for detecting out-of-band interactions. It is a tool designed to detect vulnerabilities that cause external interactions. # Features diff --git a/pkg/server/http_server.go b/pkg/server/http_server.go index efe055ae..cff3e2ae 100644 --- a/pkg/server/http_server.go +++ b/pkg/server/http_server.go @@ -153,11 +153,11 @@ func (h *HTTPServer) logger(handler http.Handler) http.HandlerFunc { const banner = `

Interactsh Server

-Interactsh is an open-source solution for out-of-band data extraction. It is a tool designed to detect bugs that cause external interactions. These bugs include, Blind SQLi, Blind CMDi, SSRF, etc.

+Interactsh is an open-source tool for detecting out-of-band interactions. It is a tool designed to detect vulnerabilities that cause external interactions.

-If you find communications or exchanges with the %s server in your logs, it is possible that someone has been testing your applications.

+If you notice any interactions from *.%s percent s in your logs, it's possible that someone (internal security engineers, pen-testers, bug-bounty hunters) has been testing your application.

-You should review the time when these interactions were initiated to identify the person responsible for this testing. +You should investigate the sites where these interactions were generated from, and if a vulnerability exists, examine the root cause and take the necessary steps to mitigate the issue. ` // defaultHandler is a handler for default collaborator requests