Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

SRS - How to build a Pen Test and Hacking Platform
SRS - How to build a Pen Test and Hacking Platform
SRS - How to build a Pen Test and Hacking Platform
Ebook39 pages21 minutes

SRS - How to build a Pen Test and Hacking Platform

Rating: 2 out of 5 stars

2/5

()

Read preview

About this ebook

This book is an SRS - a Secification and Requirements document for designing your own free penetration testing and hacking platform.

LanguageEnglish
Release dateSep 21, 2015
ISBN9781516316274
SRS - How to build a Pen Test and Hacking Platform

Read more from Alasdair Gilchrist

Related to SRS - How to build a Pen Test and Hacking Platform

Related ebooks

Internet & Web For You

View More

Related articles

Reviews for SRS - How to build a Pen Test and Hacking Platform

Rating: 2 out of 5 stars
2/5

1 rating0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    SRS - How to build a Pen Test and Hacking Platform - alasdair gilchrist

    A WEB REGOCNIZANCE, PEN TESTING & DEVELOPMENT PLATFORM

    This document is prepared by following IEEE conventions for software requirement specification: 830-1998

    1. Introduction

    2. Purpose

    3. Scope

    4. Overall Description

    4.1 User Management Requirements

    4.2 Code Editor Requirements

    4.3 Debugger Requirements

    4.4 Terminal Requirements

    4.5 Interface Requirements

    4.6 User Characteristics

    4.7 Constraints

    Section I - User Workspace Management & Registration

    5.1 User Authentication

    5.2 Specific Functional Requirements

    5.2.1 REQ 1 Register

    5.2.2 REQ 2: Login

    5.2.3 REQ 3: Workspace Management / Ownership

    5.2.4 REQ 4: Share Workspace

    5.2.5 REQ 5: GitHub Synchronization

    Section II - IDE Functional Requirements & Specifications

    6.0 Introduction

    6.1 Functional requirements

    6.1.1 REQ 8:

    6.1.2 REQ 9:

    6.1.3 REQ 10:

    6.1.4 REQ 11:

    6.1.5 REQ 12:

    6.1.6 REQ 13:

    6.1.7 REQ 14:

    6.1.8 REQ 15:

    6.1.9 REQ 16:

    7.0 Debugger

    7.1 Specific Functional Requirements

    7.1.1 REQ 17:

    7.1.2 REQ 18:

    7.1.3 REQ 19:

    7.2 Stimulus/Response Sequences

    7.2.1 REQ 17:  Debugging

    7.2.2 REQ 18: Step Into/Over/Out of the Code

    7.2.3 REQ 17: Breakpoint List

    7.2.4 REQ 18: Expression Evaluation

    8.0 Terminal

    8.1 Specific Functional Requirements

    8.1.1 REQ 19:

    8.1.2 REQ 20:

    8.1.3 REQ 21:

    9.0 Creating the Metasploit Development Environment

    9.1 Introduction

    9.1.1 REQ 22:

    9.1.2 REQ 23:

    9.1.3 REQ 24:

    9.1.4 REQ 25:

    9.1.5 REQ 26:

    9.1.6 REQ 27:

    9.1.7 REQ 28:

    9.1.8 REQ 29:

    9.1.9 REQ 30:

    10. Section III - Penetration Testing and Exploitation Modules

    10.1 Introduction

    10.2 Specific Functional Requirements

    10.2.1 REQ 31:

    10.2.2 REQ 32:

    10.2.3 REQ 33:

    10.2.4 REQ 34:

    10.2.5 REQ 35:

    10.2.6 REQ 36:

    10.2.7 REQ 37:

    10.2.8 REQ 38:

    10.2.9 REQ 39:

    10.2.10 REQ 40:

    10.2.11 REQ 41:

    10.2.12 REQ 42:

    10.2.13 REQ 43:

    10.2.14 REQ 44:

    10.2.15 REQ 45:

    10.2.16 REQ 46:

    10.2.17 REQ 47:

    10.2.18 REQ 48:

    11. Section IV Non-Functional Features & Requirements

    Enjoying the preview?
    Page 1 of 1