SRS - How to build a Pen Test and Hacking Platform
2/5
()
About this ebook
This book is an SRS - a Secification and Requirements document for designing your own free penetration testing and hacking platform.
Read more from Alasdair Gilchrist
Six Sigma Yellow Belt Certification Study Guide Rating: 0 out of 5 stars0 ratingsREST API Design Control and Management Rating: 4 out of 5 stars4/5Google Cloud Platform for Data Engineering: From Beginner to Data Engineer using Google Cloud Platform Rating: 5 out of 5 stars5/5Google Cloud Platform an Architect's Guide Rating: 5 out of 5 stars5/5A Practical Guide Wireshark Forensics Rating: 5 out of 5 stars5/5Concise Guide to OTN optical transport networks Rating: 4 out of 5 stars4/5An Executive Guide to Identity Access Management - 2nd Edition Rating: 4 out of 5 stars4/5The Layman's Guide GDPR Compliance for Small Medium Business Rating: 5 out of 5 stars5/5Concise and Simple Guide to IP Subnets Rating: 5 out of 5 stars5/5Concise Guide to DWDM Rating: 5 out of 5 stars5/5A Concise Guide to Microservices for Executive (Now for DevOps too!) Rating: 1 out of 5 stars1/5Google Cloud Platform - Networking Rating: 0 out of 5 stars0 ratingsThe Certified Ethical Hacker Exam - version 8 (The concise study guide) Rating: 3 out of 5 stars3/5Spreadsheets To Cubes (Advanced Data Analytics for Small Medium Business): Data Science Rating: 0 out of 5 stars0 ratingsGDPR for DevOp(Sec) - The laws, Controls and solutions Rating: 5 out of 5 stars5/5A Last Minute Hands-on Guide to GDPR Readiness Rating: 0 out of 5 stars0 ratingsAn Introduction to SDN Intent Based Networking Rating: 5 out of 5 stars5/5PSD2 - Open Banking for DevOps(Sec) Rating: 5 out of 5 stars5/5A concise guide to PHP MySQL and Apache Rating: 4 out of 5 stars4/5A Concise Guide to Object Orientated Programming Rating: 0 out of 5 stars0 ratingsManagement Accounting for New Managers Rating: 1 out of 5 stars1/5Tackling Fraud Rating: 4 out of 5 stars4/5Supply Chain 4.0: From Stocking Shelves to Running the World Fuelled by Industry 4.0 Rating: 3 out of 5 stars3/5Digital Success: A Holistic Approach to Digital Transformation for Enterprises and Manufacturers Rating: 0 out of 5 stars0 ratingsThe Concise Guide to SSL/TLS for DevOps Rating: 5 out of 5 stars5/5An Executive Guide Biometrics Rating: 0 out of 5 stars0 ratingsConcise Guide to CompTIA Security + Rating: 3 out of 5 stars3/5FinTech Rising: Navigating the maze of US & EU regulations Rating: 5 out of 5 stars5/5
Related to SRS - How to build a Pen Test and Hacking Platform
Related ebooks
Automating Software Tests Using Selenium Rating: 0 out of 5 stars0 ratingsInstant Approach to Software Testing Rating: 0 out of 5 stars0 ratingsAdvanced Python for Cybersecurity: Techniques in Malware Analysis, Exploit Development, and Custom Tool Creation Rating: 0 out of 5 stars0 ratingsLearning Android Application Testing Rating: 0 out of 5 stars0 ratingsLearning zANTI2 for Android Pentesting Rating: 0 out of 5 stars0 ratings(Part 2) Java 4 Selenium WebDriver: Come Learn How To Program For Automation Testing Rating: 0 out of 5 stars0 ratingsPenetration Testing: Protecting networks and systems Rating: 0 out of 5 stars0 ratingsJump Start PHP Environment: Master the World's Most Popular Language Rating: 0 out of 5 stars0 ratingsKali Linux Intrusion and Exploitation Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsGetting Started With Quick Test Professional (QTP) And Descriptive Programming Rating: 5 out of 5 stars5/5Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely Rating: 0 out of 5 stars0 ratingsASP.NET Application Development Fundamentals Rating: 0 out of 5 stars0 ratingsYour System's Sweetspots: CEO's Advice on Basic Cyber Security: CEO's Advice on Computer Science Rating: 0 out of 5 stars0 ratingsLearning CoreOS: Learning CoreOS Rating: 0 out of 5 stars0 ratingsMastering Database Design Rating: 0 out of 5 stars0 ratingsMicrosoft Dynamics CRM 2011 Customization & Configuration (MB2-866) Certification Guide Rating: 0 out of 5 stars0 ratingsCombat Ready IT and PIE: Cyber Security for Small Medium Business and Perpetual Improvement Everywhe Rating: 5 out of 5 stars5/5Software QA Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsJasmine JavaScript Testing - Second Edition Rating: 0 out of 5 stars0 ratingsPHP Security and Session Management: Managing Sessions and Ensuring PHP Security (2022 Guide for Beginners) Rating: 3 out of 5 stars3/5Security+ Exam Pass: Security Architecture, Threat Identification, Risk Management, Operations Rating: 0 out of 5 stars0 ratingsSoftware Security For You Rating: 0 out of 5 stars0 ratingsMCS-034: Software Engineering Rating: 0 out of 5 stars0 ratingsBeginning Mobile Application Development in the Cloud Rating: 0 out of 5 stars0 ratingsJump Start MySQL: Master the Database That Powers the Web Rating: 0 out of 5 stars0 ratingsReal-World Solutions for Developing High-Quality PHP Frameworks and Applications Rating: 3 out of 5 stars3/5PHP Oracle Web Development: Data processing, Security, Caching, XML, Web Services, and Ajax Rating: 0 out of 5 stars0 ratingsEnd-user computing Standard Requirements Rating: 0 out of 5 stars0 ratingsNmap 6: Network Exploration and Security Auditing Cookbook Rating: 0 out of 5 stars0 ratingsOpenCart Theme and Module Development Rating: 0 out of 5 stars0 ratings
Internet & Web For You
Coding For Dummies Rating: 5 out of 5 stars5/5The $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 4 out of 5 stars4/5Python: Learn Python in 24 Hours Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5The Basics of User Experience Design by Interaction Design Foundation Rating: 4 out of 5 stars4/5UX/UI Design Playbook Rating: 4 out of 5 stars4/5Explain the Cloud Like I’m 10 Rating: 5 out of 5 stars5/5JavaScript All-in-One For Dummies Rating: 5 out of 5 stars5/5The Designer’s Guide to Figma: Master Prototyping, Collaboration, Handoff, and Workflow Rating: 3 out of 5 stars3/5JavaScript: Beginner's Guide to Programming Code with JavaScript Rating: 5 out of 5 stars5/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5PHP and MySQL For Dummies Rating: 4 out of 5 stars4/5Get Into UX: A foolproof guide to getting your first user experience job Rating: 4 out of 5 stars4/5The Gothic Novel Collection Rating: 5 out of 5 stars5/5The Digital Marketing Handbook: A Step-By-Step Guide to Creating Websites That Sell Rating: 5 out of 5 stars5/5Web Design For Dummies Rating: 4 out of 5 stars4/5Notion for Beginners: Notion for Work, Play, and Productivity Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5HTML in 30 Pages Rating: 5 out of 5 stars5/5Principles of Web Design Rating: 0 out of 5 stars0 ratingsLinkedIn Profile Optimization For Dummies Rating: 4 out of 5 stars4/52022 Adobe® Premiere Pro Guide For Filmmakers and YouTubers Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 5 out of 5 stars5/5
Reviews for SRS - How to build a Pen Test and Hacking Platform
1 rating0 reviews
Book preview
SRS - How to build a Pen Test and Hacking Platform - alasdair gilchrist
A WEB REGOCNIZANCE, PEN TESTING & DEVELOPMENT PLATFORM
This document is prepared by following IEEE conventions for software requirement specification: 830-1998
1. Introduction
2. Purpose
3. Scope
4. Overall Description
4.1 User Management Requirements
4.2 Code Editor Requirements
4.3 Debugger Requirements
4.4 Terminal Requirements
4.5 Interface Requirements
4.6 User Characteristics
4.7 Constraints
Section I - User Workspace Management & Registration
5.1 User Authentication
5.2 Specific Functional Requirements
5.2.1 REQ 1 Register
5.2.2 REQ 2: Login
5.2.3 REQ 3: Workspace Management / Ownership
5.2.4 REQ 4: Share Workspace
5.2.5 REQ 5: GitHub Synchronization
Section II - IDE Functional Requirements & Specifications
6.0 Introduction
6.1 Functional requirements
6.1.1 REQ 8:
6.1.2 REQ 9:
6.1.3 REQ 10:
6.1.4 REQ 11:
6.1.5 REQ 12:
6.1.6 REQ 13:
6.1.7 REQ 14:
6.1.8 REQ 15:
6.1.9 REQ 16:
7.0 Debugger
7.1 Specific Functional Requirements
7.1.1 REQ 17:
7.1.2 REQ 18:
7.1.3 REQ 19:
7.2 Stimulus/Response Sequences
7.2.1 REQ 17: Debugging
7.2.2 REQ 18: Step Into/Over/Out of the Code
7.2.3 REQ 17: Breakpoint List
7.2.4 REQ 18: Expression Evaluation
8.0 Terminal
8.1 Specific Functional Requirements
8.1.1 REQ 19:
8.1.2 REQ 20:
8.1.3 REQ 21:
9.0 Creating the Metasploit Development Environment
9.1 Introduction
9.1.1 REQ 22:
9.1.2 REQ 23:
9.1.3 REQ 24:
9.1.4 REQ 25:
9.1.5 REQ 26:
9.1.6 REQ 27:
9.1.7 REQ 28:
9.1.8 REQ 29:
9.1.9 REQ 30:
10. Section III - Penetration Testing and Exploitation Modules
10.1 Introduction
10.2 Specific Functional Requirements
10.2.1 REQ 31:
10.2.2 REQ 32:
10.2.3 REQ 33:
10.2.4 REQ 34:
10.2.5 REQ 35:
10.2.6 REQ 36:
10.2.7 REQ 37:
10.2.8 REQ 38:
10.2.9 REQ 39:
10.2.10 REQ 40:
10.2.11 REQ 41:
10.2.12 REQ 42:
10.2.13 REQ 43:
10.2.14 REQ 44:
10.2.15 REQ 45:
10.2.16 REQ 46:
10.2.17 REQ 47:
10.2.18 REQ 48:
11. Section IV Non-Functional Features & Requirements