Smersh is a tool specifically designed for pentesters, used to monitor the progress of work in a company and create interactions between them.
Architecture of the proletterof
SMERSH uses many docker containers in its architecture, which means you need to enable some services. Below you will see the full list of ports you need to open. In addition, you will see the shape that composes the base of the data.
Port mapping
Container | DefaultDNS |
---|---|
Api | api. {DOMAIN} |
Bitwarden | bitwarden. {DOMAIN} |
Client | OM DOMAIN} |
Db | NOT EXPOSED |
php | NOT EXPOSED |
CodiMD | codimd. {DOMAIN} |
db-codiMD | NOT EXPOSED |
Application life cycle
SMERSH is designed in such a way that the person in charge of each company prepares the target and all that remains is for the pentester to fill in the vulnerabilities points that were detected during the control it will carry out.
Installation of the program
Information about installing the program, you will find here.