SRS - How to build a Pen Test and Hacking Platform
2/5
()
About this ebook
This book is an SRS - a Secification and Requirements document for designing your own free penetration testing and hacking platform.
Read more from Alasdair Gilchrist
Spreadsheets To Cubes (Advanced Data Analytics for Small Medium Business): Data Science Rating: 0 out of 5 stars0 ratingsA Practical Guide Wireshark Forensics Rating: 5 out of 5 stars5/5REST API Design Control and Management Rating: 4 out of 5 stars4/5Google Cloud Platform an Architect's Guide Rating: 5 out of 5 stars5/5Google Cloud Platform for Data Engineering: From Beginner to Data Engineer using Google Cloud Platform Rating: 5 out of 5 stars5/5Concise Guide to OTN optical transport networks Rating: 4 out of 5 stars4/5Six Sigma Yellow Belt Certification Study Guide Rating: 0 out of 5 stars0 ratingsA Concise Guide to Microservices for Executive (Now for DevOps too!) Rating: 1 out of 5 stars1/5Concise Guide to DWDM Rating: 5 out of 5 stars5/5Supply Chain 4.0: From Stocking Shelves to Running the World Fuelled by Industry 4.0 Rating: 3 out of 5 stars3/5An Executive Guide to Identity Access Management - 2nd Edition Rating: 4 out of 5 stars4/5A Concise Guide to Object Orientated Programming Rating: 0 out of 5 stars0 ratingsGoogle Cloud Platform - Networking Rating: 0 out of 5 stars0 ratingsThe Layman's Guide GDPR Compliance for Small Medium Business Rating: 5 out of 5 stars5/5The Certified Ethical Hacker Exam - version 8 (The concise study guide) Rating: 3 out of 5 stars3/5Concise and Simple Guide to IP Subnets Rating: 5 out of 5 stars5/5Digital Success: A Holistic Approach to Digital Transformation for Enterprises and Manufacturers Rating: 0 out of 5 stars0 ratingsPSD2 - Open Banking for DevOps(Sec) Rating: 5 out of 5 stars5/5An Introduction to SDN Intent Based Networking Rating: 5 out of 5 stars5/5A Last Minute Hands-on Guide to GDPR Readiness Rating: 0 out of 5 stars0 ratingsConcise Guide to CompTIA Security + Rating: 3 out of 5 stars3/5Management Accounting for New Managers Rating: 1 out of 5 stars1/5FinTech Rising: Navigating the maze of US & EU regulations Rating: 5 out of 5 stars5/5GDPR for DevOp(Sec) - The laws, Controls and solutions Rating: 5 out of 5 stars5/5Tackling Fraud Rating: 4 out of 5 stars4/5The Concise Guide to the Internet of Things for Executives Rating: 4 out of 5 stars4/5The Concise Guide to SSL/TLS for DevOps Rating: 5 out of 5 stars5/5ChatGPT Will Won't Save The World Rating: 0 out of 5 stars0 ratingsWhy Industry 4.0 Sucks! Rating: 0 out of 5 stars0 ratings
Related to SRS - How to build a Pen Test and Hacking Platform
Related ebooks
Java™ Programming: A Complete Project Lifecycle Guide Rating: 0 out of 5 stars0 ratingsSecuring Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Rating: 0 out of 5 stars0 ratingsMulti-Tier Application Programming with PHP: Practical Guide for Architects and Programmers Rating: 0 out of 5 stars0 ratingsIan Talks JavaScript Libraries and Frameworks A-Z: WebDevAtoZ, #4 Rating: 0 out of 5 stars0 ratingsWeb Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-' Rating: 5 out of 5 stars5/5Security and Privacy in the Internet of Things: & Dark-web Investigation Rating: 0 out of 5 stars0 ratingsBeginning Mobile Application Development in the Cloud Rating: 0 out of 5 stars0 ratingsCommon Windows, Linux and Web Server Systems Hacking Techniques Rating: 0 out of 5 stars0 ratingsAdvanced Penetration Testing with Kali Linux: Unlocking industry-oriented VAPT tactics (English Edition) Rating: 0 out of 5 stars0 ratingsPenetration Testing: Protecting networks and systems Rating: 0 out of 5 stars0 ratingsOnline Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsPenetration Testing A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsMalware Sandbox A Clear and Concise Reference Rating: 0 out of 5 stars0 ratingsBeginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues Rating: 0 out of 5 stars0 ratingsWeb Application Security is a Stack: How to CYA (Cover Your Apps) Completely Rating: 0 out of 5 stars0 ratingsMobile App Testing Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsBug Hunting 101: Novice To Virtuoso: Web Application Security For Ethical Hackers Rating: 0 out of 5 stars0 ratingsLearning Android Application Testing Rating: 0 out of 5 stars0 ratingsCyber Security Policy A Complete Guide - 2020 Edition Rating: 5 out of 5 stars5/5Thor's Microsoft Security Bible: A Collection of Practical Security Techniques Rating: 0 out of 5 stars0 ratingsImplementing Digital Forensic Readiness: From Reactive to Proactive Process Rating: 0 out of 5 stars0 ratingsThe Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice Rating: 0 out of 5 stars0 ratingsDissecting the Hack: The F0rb1dd3n Network, Revised Edition Rating: 5 out of 5 stars5/5APIs A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsGreatest Hackers in the History Rating: 5 out of 5 stars5/5Software Development in Practice Rating: 0 out of 5 stars0 ratingsMobile Device Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratings
Internet & Web For You
Coding For Dummies Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5How to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsNo Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Six Figure Blogging Blueprint Rating: 5 out of 5 stars5/5How To Start A Profitable Authority Blog In Under One Hour Rating: 5 out of 5 stars5/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5Podcasting For Dummies Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5The Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5How To Make Money Blogging: How I Replaced My Day-Job With My Blog and How You Can Start A Blog Today Rating: 4 out of 5 stars4/5Get Rich or Lie Trying: Ambition and Deceit in the New Influencer Economy Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How To Start A Podcast Rating: 4 out of 5 stars4/5Python QuickStart Guide: The Simplified Beginner's Guide to Python Programming Using Hands-On Projects and Real-World Applications Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 4 out of 5 stars4/5Six Figure Blogging In 3 Months Rating: 4 out of 5 stars4/5The $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 5 out of 5 stars5/5The Logo Brainstorm Book: A Comprehensive Guide for Exploring Design Directions Rating: 4 out of 5 stars4/5The Gothic Novel Collection Rating: 5 out of 5 stars5/5Tube Ritual: Jumpstart Your Journey to 5000 YouTube Subscribers Rating: 0 out of 5 stars0 ratingsThe Mega Box: The Ultimate Guide to the Best Free Resources on the Internet Rating: 4 out of 5 stars4/5The Digital Marketing Handbook: A Step-By-Step Guide to Creating Websites That Sell Rating: 5 out of 5 stars5/5Remote/WebCam Notarization <<Extended>> Commonwealth of Virginia Rating: 0 out of 5 stars0 ratings
Reviews for SRS - How to build a Pen Test and Hacking Platform
1 rating0 reviews
Book preview
SRS - How to build a Pen Test and Hacking Platform - alasdair gilchrist
A WEB REGOCNIZANCE, PEN TESTING & DEVELOPMENT PLATFORM
This document is prepared by following IEEE conventions for software requirement specification: 830-1998
1. Introduction
2. Purpose
3. Scope
4. Overall Description
4.1 User Management Requirements
4.2 Code Editor Requirements
4.3 Debugger Requirements
4.4 Terminal Requirements
4.5 Interface Requirements
4.6 User Characteristics
4.7 Constraints
Section I - User Workspace Management & Registration
5.1 User Authentication
5.2 Specific Functional Requirements
5.2.1 REQ 1 Register
5.2.2 REQ 2: Login
5.2.3 REQ 3: Workspace Management / Ownership
5.2.4 REQ 4: Share Workspace
5.2.5 REQ 5: GitHub Synchronization
Section II - IDE Functional Requirements & Specifications
6.0 Introduction
6.1 Functional requirements
6.1.1 REQ 8:
6.1.2 REQ 9:
6.1.3 REQ 10:
6.1.4 REQ 11:
6.1.5 REQ 12:
6.1.6 REQ 13:
6.1.7 REQ 14:
6.1.8 REQ 15:
6.1.9 REQ 16:
7.0 Debugger
7.1 Specific Functional Requirements
7.1.1 REQ 17:
7.1.2 REQ 18:
7.1.3 REQ 19:
7.2 Stimulus/Response Sequences
7.2.1 REQ 17: Debugging
7.2.2 REQ 18: Step Into/Over/Out of the Code
7.2.3 REQ 17: Breakpoint List
7.2.4 REQ 18: Expression Evaluation
8.0 Terminal
8.1 Specific Functional Requirements
8.1.1 REQ 19:
8.1.2 REQ 20:
8.1.3 REQ 21:
9.0 Creating the Metasploit Development Environment
9.1 Introduction
9.1.1 REQ 22:
9.1.2 REQ 23:
9.1.3 REQ 24:
9.1.4 REQ 25:
9.1.5 REQ 26:
9.1.6 REQ 27:
9.1.7 REQ 28:
9.1.8 REQ 29:
9.1.9 REQ 30:
10. Section III - Penetration Testing and Exploitation Modules
10.1 Introduction
10.2 Specific Functional Requirements
10.2.1 REQ 31:
10.2.2 REQ 32:
10.2.3 REQ 33:
10.2.4 REQ 34:
10.2.5 REQ 35:
10.2.6 REQ 36:
10.2.7 REQ 37:
10.2.8 REQ 38:
10.2.9 REQ 39:
10.2.10 REQ 40:
10.2.11 REQ 41:
10.2.12 REQ 42:
10.2.13 REQ 43:
10.2.14 REQ 44:
10.2.15 REQ 45:
10.2.16 REQ 46:
10.2.17 REQ 47:
10.2.18 REQ 48:
11. Section IV Non-Functional Features & Requirements