SRS - How to build a Pen Test and Hacking Platform
2/5
()
About this ebook
This book is an SRS - a Secification and Requirements document for designing your own free penetration testing and hacking platform.
Read more from Alasdair Gilchrist
Spreadsheets To Cubes (Advanced Data Analytics for Small Medium Business): Data Science Rating: 0 out of 5 stars0 ratingsThe Layman's Guide GDPR Compliance for Small Medium Business Rating: 5 out of 5 stars5/5Google Cloud Platform an Architect's Guide Rating: 5 out of 5 stars5/5REST API Design Control and Management Rating: 4 out of 5 stars4/5Concise and Simple Guide to IP Subnets Rating: 5 out of 5 stars5/5Supply Chain 4.0: From Stocking Shelves to Running the World Fuelled by Industry 4.0 Rating: 3 out of 5 stars3/5Concise Guide to DWDM Rating: 5 out of 5 stars5/5Google Cloud Platform for Data Engineering: From Beginner to Data Engineer using Google Cloud Platform Rating: 5 out of 5 stars5/5A Practical Guide Wireshark Forensics Rating: 5 out of 5 stars5/5A Concise Guide to Object Orientated Programming Rating: 0 out of 5 stars0 ratingsConcise Guide to OTN optical transport networks Rating: 4 out of 5 stars4/5A Concise Guide to Microservices for Executive (Now for DevOps too!) Rating: 1 out of 5 stars1/5Six Sigma Yellow Belt Certification Study Guide Rating: 0 out of 5 stars0 ratingsAn Executive Guide to Identity Access Management - 2nd Edition Rating: 4 out of 5 stars4/5Google Cloud Platform - Networking Rating: 0 out of 5 stars0 ratingsThe Certified Ethical Hacker Exam - version 8 (The concise study guide) Rating: 3 out of 5 stars3/5GDPR for DevOp(Sec) - The laws, Controls and solutions Rating: 5 out of 5 stars5/5Tackling Fraud Rating: 4 out of 5 stars4/5PSD2 - Open Banking for DevOps(Sec) Rating: 5 out of 5 stars5/5An Introduction to SDN Intent Based Networking Rating: 5 out of 5 stars5/5Digital Success: A Holistic Approach to Digital Transformation for Enterprises and Manufacturers Rating: 0 out of 5 stars0 ratingsA Last Minute Hands-on Guide to GDPR Readiness Rating: 0 out of 5 stars0 ratingsFinTech Rising: Navigating the maze of US & EU regulations Rating: 5 out of 5 stars5/5The Concise Guide to SSL/TLS for DevOps Rating: 5 out of 5 stars5/5Why Industry 4.0 Sucks! Rating: 0 out of 5 stars0 ratingsConcise Guide to CompTIA Security + Rating: 3 out of 5 stars3/5The Concise Guide to the Internet of Things for Executives Rating: 4 out of 5 stars4/5A concise guide to PHP MySQL and Apache Rating: 4 out of 5 stars4/5ChatGPT Will Won't Save The World Rating: 0 out of 5 stars0 ratings
Related to SRS - How to build a Pen Test and Hacking Platform
Related ebooks
Multi-Tier Application Programming with PHP: Practical Guide for Architects and Programmers Rating: 0 out of 5 stars0 ratingsSecuring Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Rating: 0 out of 5 stars0 ratingsJava™ Programming: A Complete Project Lifecycle Guide Rating: 0 out of 5 stars0 ratingsHybrid Cloud Management with Red Hat CloudForms Rating: 0 out of 5 stars0 ratingsSoftware Security For You Rating: 0 out of 5 stars0 ratingsSecuring SQL Server: Protecting Your Database from Attackers Rating: 0 out of 5 stars0 ratingsThe Hackers Are Coming Rating: 0 out of 5 stars0 ratingsBeginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues Rating: 0 out of 5 stars0 ratingsWeb Application Security is a Stack: How to CYA (Cover Your Apps) Completely Rating: 0 out of 5 stars0 ratingsGPlus: Google Plus Strategies, Profiles, Circles, Communities, & Hangouts. A DivaPreneurs Quick Start Guide to Google Plus Rating: 0 out of 5 stars0 ratingsPractical Malware Prevention Rating: 0 out of 5 stars0 ratingsOnline Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsAPIs A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCommon Windows, Linux and Web Server Systems Hacking Techniques Rating: 0 out of 5 stars0 ratingsAdvanced Penetration Testing with Kali Linux: Unlocking industry-oriented VAPT tactics (English Edition) Rating: 0 out of 5 stars0 ratingsWarDriving: Drive, Detect, Defend: A Guide to Wireless Security Rating: 3 out of 5 stars3/5Managing Cybersecurity Risk: Cases Studies and Solutions Rating: 5 out of 5 stars5/5Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-' Rating: 5 out of 5 stars5/5Reverse Engineering A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsGreatest Hackers in the History Rating: 5 out of 5 stars5/5Compsec: For the Home User Rating: 0 out of 5 stars0 ratingsSoftware Development in Practice Rating: 0 out of 5 stars0 ratingsAndroid Application Security Essentials Rating: 0 out of 5 stars0 ratingsLearn All About Cyber Safety Rating: 0 out of 5 stars0 ratingsAgile Software Development: Incremental-Based Work Benefits Developers and Customers Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsEleventh Hour Security+: Exam SY0-201 Study Guide Rating: 0 out of 5 stars0 ratingsAnti Hacking Security: Fight Data Breach Rating: 0 out of 5 stars0 ratingsBeginning Mobile Application Development in the Cloud Rating: 0 out of 5 stars0 ratingsCyber Security ISMS Policies And Procedures A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratings
Internet & Web For You
How to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsPython QuickStart Guide: The Simplified Beginner's Guide to Python Programming Using Hands-On Projects and Real-World Applications Rating: 0 out of 5 stars0 ratingsNo Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5How To Start A Podcast Rating: 4 out of 5 stars4/5Six Figure Blogging Blueprint Rating: 5 out of 5 stars5/5The Gothic Novel Collection Rating: 5 out of 5 stars5/5Coding For Dummies Rating: 5 out of 5 stars5/5How To Make Money Blogging: How I Replaced My Day-Job With My Blog and How You Can Start A Blog Today Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Podcasting For Dummies Rating: 4 out of 5 stars4/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5The Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5Get Rich or Lie Trying: Ambition and Deceit in the New Influencer Economy Rating: 0 out of 5 stars0 ratingsCreate Something Awesome: How Creators are Profiting from Their Passion in the Creator Economy Rating: 0 out of 5 stars0 ratingsThe $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 5 out of 5 stars5/5How to Destroy Surveillance Capitalism Rating: 4 out of 5 stars4/5More Porn - Faster!: 50 Tips & Tools for Faster and More Efficient Porn Browsing Rating: 3 out of 5 stars3/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Surveillance and Surveillance Detection: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsGrokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5The Mega Box: The Ultimate Guide to the Best Free Resources on the Internet Rating: 4 out of 5 stars4/5The Logo Brainstorm Book: A Comprehensive Guide for Exploring Design Directions Rating: 4 out of 5 stars4/5Wordpress for Beginners: The Easy Step-by-Step Guide to Creating a Website with WordPress Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5
Reviews for SRS - How to build a Pen Test and Hacking Platform
1 rating0 reviews
Book preview
SRS - How to build a Pen Test and Hacking Platform - alasdair gilchrist
A WEB REGOCNIZANCE, PEN TESTING & DEVELOPMENT PLATFORM
This document is prepared by following IEEE conventions for software requirement specification: 830-1998
1. Introduction
2. Purpose
3. Scope
4. Overall Description
4.1 User Management Requirements
4.2 Code Editor Requirements
4.3 Debugger Requirements
4.4 Terminal Requirements
4.5 Interface Requirements
4.6 User Characteristics
4.7 Constraints
Section I - User Workspace Management & Registration
5.1 User Authentication
5.2 Specific Functional Requirements
5.2.1 REQ 1 Register
5.2.2 REQ 2: Login
5.2.3 REQ 3: Workspace Management / Ownership
5.2.4 REQ 4: Share Workspace
5.2.5 REQ 5: GitHub Synchronization
Section II - IDE Functional Requirements & Specifications
6.0 Introduction
6.1 Functional requirements
6.1.1 REQ 8:
6.1.2 REQ 9:
6.1.3 REQ 10:
6.1.4 REQ 11:
6.1.5 REQ 12:
6.1.6 REQ 13:
6.1.7 REQ 14:
6.1.8 REQ 15:
6.1.9 REQ 16:
7.0 Debugger
7.1 Specific Functional Requirements
7.1.1 REQ 17:
7.1.2 REQ 18:
7.1.3 REQ 19:
7.2 Stimulus/Response Sequences
7.2.1 REQ 17: Debugging
7.2.2 REQ 18: Step Into/Over/Out of the Code
7.2.3 REQ 17: Breakpoint List
7.2.4 REQ 18: Expression Evaluation
8.0 Terminal
8.1 Specific Functional Requirements
8.1.1 REQ 19:
8.1.2 REQ 20:
8.1.3 REQ 21:
9.0 Creating the Metasploit Development Environment
9.1 Introduction
9.1.1 REQ 22:
9.1.2 REQ 23:
9.1.3 REQ 24:
9.1.4 REQ 25:
9.1.5 REQ 26:
9.1.6 REQ 27:
9.1.7 REQ 28:
9.1.8 REQ 29:
9.1.9 REQ 30:
10. Section III - Penetration Testing and Exploitation Modules
10.1 Introduction
10.2 Specific Functional Requirements
10.2.1 REQ 31:
10.2.2 REQ 32:
10.2.3 REQ 33:
10.2.4 REQ 34:
10.2.5 REQ 35:
10.2.6 REQ 36:
10.2.7 REQ 37:
10.2.8 REQ 38:
10.2.9 REQ 39:
10.2.10 REQ 40:
10.2.11 REQ 41:
10.2.12 REQ 42:
10.2.13 REQ 43:
10.2.14 REQ 44:
10.2.15 REQ 45:
10.2.16 REQ 46:
10.2.17 REQ 47:
10.2.18 REQ 48:
11. Section IV Non-Functional Features & Requirements