The Smersh is a tool specially designed for pentesters, who usesto monitor their progress work in one company and creating interactions between them.
Architecture of the proletterof
SMERSH uses many docker containers in its architecture, which means you have to allow some services. Below you will find the complete list of doors you need to open. In addition, you will see the shape that composes the database.
Port mapping
Container | DefaultDNS |
---|---|
Api | api. {DOMAIN} |
Bitwarden | bitwarden. {DOMAIN} |
Client | OM DOMAIN} |
Db | NOT EXPOSED |
php | NOT EXPOSED |
CodiMD | codimd. {DOMAIN} |
db-codiMD | NOT EXPOSED |
Application life cycle
SMERSH is designed in such a way that the person in charge of each company prepares the target and all that remains is for the pentester to fill in the vulnerabilities identified during the audit.
Installation of the program
Information about installing the program, you will find here.