Smersh: Tool specially designed for pentesters

Smersh is one specially configured for pentesters, used to track the progress of work in a company and create interactions between them.

preview fake mission 1024x324

Project architecture

SMERSH uses a lot containers in its architecture, which means you have to allow some services. Below you will see the full list of ports you need to open. Additionally, you will see the schema that makes up the database.

stew 768x420

Port mapping

Container DefaultDNS
Api api. {DOMAIN}
Bitwarden bitwarden. {DOMAIN}
Client OM DOMAIN}
Db NOT EXPOSED
php NOT EXPOSED
CodiMD codimd. {DOMAIN}
db-codiMD NOT EXPOSED

Her life cycle ς

SMERSH is designed in such a way that the person in charge of each company prepares the target and all that remains is the to fill in the gaps that were detected during the control it will carry out.

uml smersh

 

Installation of the program

Information about installing the program, you will find here.

 

 

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.
Smersh, pentest

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).