Smersh is a tool specifically designed for pentesters, used to monitor the progress of work in a company and create interactions between them.
Table of Contents
Project architecture
SMERSH uses many docker containers in its architecture, which means you have to allow some services. Below you will find the complete list of doors you need to open. In addition, you will see the shape that composes the database.
Port mapping
Container | DefaultDNS |
---|---|
Api | api. {DOMAIN} |
Bitwarden | bitwarden. {DOMAIN} |
Client | OM DOMAIN} |
Db | NOT EXPOSED |
php | NOT EXPOSED |
CodiMD | codimd. {DOMAIN} |
db-codiMD | NOT EXPOSED |
Application life cycle
SMERSH is designed in such a way that the person in charge of each company prepares the target and all that remains is for the pentester to fill in the vulnerabilities identified during the audit.
Installation of the program
Information about installing the program, you will find here.