Nodes
On this page you will learn what is a node
in Trickest platform and how it serves as a main building block for executing offensive cybersecurity workflows.
Trickest Node
Trickest Node is a containerized environment that wraps a specific tool or script and provides a standardized way of executing it.
This way, Trickest solves 2 out of 4 challenges we mentioned previously
- ✅ Download the tool - You don’t need to download the tools anymore, it will be available in the platform or can be imported.
- ✅ Install dependencies - The dependencies needed and optimal operating system for the tool are preinstalled, you don’t need to worry about this ever again.
- Configure the tool
- Run the tool
Tool Configuration & Inputs
If you remember from previous page, the tool execution and configuration comes with it’s own parameters
In this example, we are running nikto
tool with -h
parameter that specifies the target URL.
In Trickest, you can configure the tool execution and parameters in the node
configuration. What is more important, you don’t need to worry about the command parameter values, they will have a human-readable format easy to understand.
Trickest Tool with a parameter
Inputs
Parameter values are explicitly provided through a different node called inputs
Inputs can be
- String
- File
- Folder
- Boolean
Let’s look at example of String input.
Trickest Tool with string input
Now, let’s look how different inputs can be used in Trickest.