SRS - How to build a Pen Test and Hacking Platform
2/5
()
About this ebook
This book is an SRS - a Secification and Requirements document for designing your own free penetration testing and hacking platform.
Read more from Alasdair Gilchrist
Six Sigma Yellow Belt Certification Study Guide Rating: 0 out of 5 stars0 ratingsREST API Design Control and Management Rating: 4 out of 5 stars4/5Spreadsheets To Cubes (Advanced Data Analytics for Small Medium Business): Data Science Rating: 0 out of 5 stars0 ratingsGoogle Cloud Platform an Architect's Guide Rating: 5 out of 5 stars5/5Google Cloud Platform for Data Engineering: From Beginner to Data Engineer using Google Cloud Platform Rating: 5 out of 5 stars5/5An Executive Guide to Identity Access Management - 2nd Edition Rating: 4 out of 5 stars4/5Concise Guide to DWDM Rating: 5 out of 5 stars5/5A Practical Guide Wireshark Forensics Rating: 5 out of 5 stars5/5Concise Guide to OTN optical transport networks Rating: 4 out of 5 stars4/5A Concise Guide to Microservices for Executive (Now for DevOps too!) Rating: 1 out of 5 stars1/5Supply Chain 4.0: From Stocking Shelves to Running the World Fuelled by Industry 4.0 Rating: 3 out of 5 stars3/5A Concise Guide to Object Orientated Programming Rating: 0 out of 5 stars0 ratingsGoogle Cloud Platform - Networking Rating: 0 out of 5 stars0 ratingsThe Certified Ethical Hacker Exam - version 8 (The concise study guide) Rating: 3 out of 5 stars3/5Digital Success: A Holistic Approach to Digital Transformation for Enterprises and Manufacturers Rating: 0 out of 5 stars0 ratingsThe Layman's Guide GDPR Compliance for Small Medium Business Rating: 5 out of 5 stars5/5Concise and Simple Guide to IP Subnets Rating: 5 out of 5 stars5/5Why Industry 4.0 Sucks! Rating: 0 out of 5 stars0 ratingsTackling Fraud Rating: 4 out of 5 stars4/5GDPR for DevOp(Sec) - The laws, Controls and solutions Rating: 5 out of 5 stars5/5A Last Minute Hands-on Guide to GDPR Readiness Rating: 0 out of 5 stars0 ratingsPSD2 - Open Banking for DevOps(Sec) Rating: 5 out of 5 stars5/5The Concise Guide to SSL/TLS for DevOps Rating: 5 out of 5 stars5/5An Introduction to SDN Intent Based Networking Rating: 5 out of 5 stars5/5Concise Guide to CompTIA Security + Rating: 3 out of 5 stars3/5FinTech Rising: Navigating the maze of US & EU regulations Rating: 5 out of 5 stars5/5The Concise Guide to the Internet of Things for Executives Rating: 4 out of 5 stars4/5ChatGPT Will Won't Save The World Rating: 0 out of 5 stars0 ratingsManagement Accounting for New Managers Rating: 1 out of 5 stars1/5
Related to SRS - How to build a Pen Test and Hacking Platform
Related ebooks
Multi-Tier Application Programming with PHP: Practical Guide for Architects and Programmers Rating: 0 out of 5 stars0 ratingsSecuring Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Rating: 0 out of 5 stars0 ratingsJava™ Programming: A Complete Project Lifecycle Guide Rating: 0 out of 5 stars0 ratingsHybrid Cloud Management with Red Hat CloudForms Rating: 0 out of 5 stars0 ratingsSoftware Security For You Rating: 0 out of 5 stars0 ratingsSecuring SQL Server: Protecting Your Database from Attackers Rating: 0 out of 5 stars0 ratingsThe Hackers Are Coming Rating: 0 out of 5 stars0 ratingsBeginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues Rating: 0 out of 5 stars0 ratingsWeb Application Security is a Stack: How to CYA (Cover Your Apps) Completely Rating: 0 out of 5 stars0 ratingsGPlus: Google Plus Strategies, Profiles, Circles, Communities, & Hangouts. A DivaPreneurs Quick Start Guide to Google Plus Rating: 0 out of 5 stars0 ratingsPractical Malware Prevention Rating: 0 out of 5 stars0 ratingsOnline Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsAPIs A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCommon Windows, Linux and Web Server Systems Hacking Techniques Rating: 0 out of 5 stars0 ratingsAdvanced Penetration Testing with Kali Linux: Unlocking industry-oriented VAPT tactics (English Edition) Rating: 0 out of 5 stars0 ratingsWarDriving: Drive, Detect, Defend: A Guide to Wireless Security Rating: 3 out of 5 stars3/5Managing Cybersecurity Risk: Cases Studies and Solutions Rating: 5 out of 5 stars5/5Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-' Rating: 5 out of 5 stars5/5Reverse Engineering A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsGreatest Hackers in the History Rating: 5 out of 5 stars5/5Compsec: For the Home User Rating: 0 out of 5 stars0 ratingsSoftware Development in Practice Rating: 0 out of 5 stars0 ratingsAndroid Application Security Essentials Rating: 0 out of 5 stars0 ratingsLearn All About Cyber Safety Rating: 0 out of 5 stars0 ratingsAgile Software Development: Incremental-Based Work Benefits Developers and Customers Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsEleventh Hour Security+: Exam SY0-201 Study Guide Rating: 0 out of 5 stars0 ratingsAnti Hacking Security: Fight Data Breach Rating: 0 out of 5 stars0 ratingsBeginning Mobile Application Development in the Cloud Rating: 0 out of 5 stars0 ratingsCyber Security ISMS Policies And Procedures A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratings
Internet & Web For You
Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5How to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsNo Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5Coding For Dummies Rating: 5 out of 5 stars5/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5Get Rich or Lie Trying: Ambition and Deceit in the New Influencer Economy Rating: 0 out of 5 stars0 ratingsSix Figure Blogging Blueprint Rating: 5 out of 5 stars5/5Beginner's Guide To Starting An Etsy Print-On-Demand Shop Rating: 0 out of 5 stars0 ratingsEverybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Podcasting For Dummies Rating: 4 out of 5 stars4/5The Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5The Gothic Novel Collection Rating: 5 out of 5 stars5/5The Logo Brainstorm Book: A Comprehensive Guide for Exploring Design Directions Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How To Start A Podcast Rating: 4 out of 5 stars4/5200+ Ways to Protect Your Privacy: Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline Rating: 0 out of 5 stars0 ratingsThe Internet Is Not What You Think It Is: A History, a Philosophy, a Warning Rating: 4 out of 5 stars4/5The Digital Marketing Handbook: A Step-By-Step Guide to Creating Websites That Sell Rating: 5 out of 5 stars5/5More Porn - Faster!: 50 Tips & Tools for Faster and More Efficient Porn Browsing Rating: 3 out of 5 stars3/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsThe $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 5 out of 5 stars5/5Introduction to Internet Scams and Fraud: Credit Card Theft, Work-At-Home Scams and Lottery Scams Rating: 4 out of 5 stars4/5
Reviews for SRS - How to build a Pen Test and Hacking Platform
1 rating0 reviews
Book preview
SRS - How to build a Pen Test and Hacking Platform - alasdair gilchrist
A WEB REGOCNIZANCE, PEN TESTING & DEVELOPMENT PLATFORM
This document is prepared by following IEEE conventions for software requirement specification: 830-1998
1. Introduction
2. Purpose
3. Scope
4. Overall Description
4.1 User Management Requirements
4.2 Code Editor Requirements
4.3 Debugger Requirements
4.4 Terminal Requirements
4.5 Interface Requirements
4.6 User Characteristics
4.7 Constraints
Section I - User Workspace Management & Registration
5.1 User Authentication
5.2 Specific Functional Requirements
5.2.1 REQ 1 Register
5.2.2 REQ 2: Login
5.2.3 REQ 3: Workspace Management / Ownership
5.2.4 REQ 4: Share Workspace
5.2.5 REQ 5: GitHub Synchronization
Section II - IDE Functional Requirements & Specifications
6.0 Introduction
6.1 Functional requirements
6.1.1 REQ 8:
6.1.2 REQ 9:
6.1.3 REQ 10:
6.1.4 REQ 11:
6.1.5 REQ 12:
6.1.6 REQ 13:
6.1.7 REQ 14:
6.1.8 REQ 15:
6.1.9 REQ 16:
7.0 Debugger
7.1 Specific Functional Requirements
7.1.1 REQ 17:
7.1.2 REQ 18:
7.1.3 REQ 19:
7.2 Stimulus/Response Sequences
7.2.1 REQ 17: Debugging
7.2.2 REQ 18: Step Into/Over/Out of the Code
7.2.3 REQ 17: Breakpoint List
7.2.4 REQ 18: Expression Evaluation
8.0 Terminal
8.1 Specific Functional Requirements
8.1.1 REQ 19:
8.1.2 REQ 20:
8.1.3 REQ 21:
9.0 Creating the Metasploit Development Environment
9.1 Introduction
9.1.1 REQ 22:
9.1.2 REQ 23:
9.1.3 REQ 24:
9.1.4 REQ 25:
9.1.5 REQ 26:
9.1.6 REQ 27:
9.1.7 REQ 28:
9.1.8 REQ 29:
9.1.9 REQ 30:
10. Section III - Penetration Testing and Exploitation Modules
10.1 Introduction
10.2 Specific Functional Requirements
10.2.1 REQ 31:
10.2.2 REQ 32:
10.2.3 REQ 33:
10.2.4 REQ 34:
10.2.5 REQ 35:
10.2.6 REQ 36:
10.2.7 REQ 37:
10.2.8 REQ 38:
10.2.9 REQ 39:
10.2.10 REQ 40:
10.2.11 REQ 41:
10.2.12 REQ 42:
10.2.13 REQ 43:
10.2.14 REQ 44:
10.2.15 REQ 45:
10.2.16 REQ 46:
10.2.17 REQ 47:
10.2.18 REQ 48:
11. Section IV Non-Functional Features & Requirements