Appendix A

Screenshots of Docker Containers

The two different operating systems run six containers:

Figure A1. The Docker containers running Reconmap on Windows 11. Shown here in the Docker Desktop application.

Windows Docker Containers

Figure A2. Docker containers running Reconmap on an Ubuntu Server. These services are shown here launching from the terminal with docker-compose. Network and Application Diagrams

Ubuntu Docker Containers

Figure A3. This diagram shows the network of the systems running Reconmap for this project. It was generated with a network mapper tool from Visual Paradigm (VisualParadigm, 2022). The green check marks show the systems needed to be compatible with Reconmap.

Diagram

Appendix B

Screenshots of Reconmap

The following are screenshots of the finished Reconmap platform after it was installed. These screenshots show the user interface of the application and its customizable features.

Figure B1. A screenshot of the dashboard after successful installation of the Reconmap platform.

Dashboard

Figure B2. A screenshot of Reconmap’s templates page.

Template

Figure B3. The system architecture for the Reconmap Platform (Santiago, 2022).

Architecture

References

Alharbi, M. (2010, April 29). Writing a Penetration Testing Report. SANS Institute. Retrieved December 12, 2022, from https://www.sans.org/white-papers/33343/

Atlassian. (2019). What is Kanban? Retrieved December 18, 2022, from https://www.atlassian.com/agile/kanban

Detectify Labs. (2021, November 30). Hakluke: Creating the Perfect Bug Bounty Automation. Retrieved December 8, 2022, from https://labs.detectify.com/2021/11/30/haklukecreating-the-perfect-bug-bounty-automation/

Lean Enterprise Institute. (2022, June 3). Plan, Do, Check, Act (PDCA) — A Resource Guide. Retrieved December 8, 2022, from https://www.lean.org/lexicon-terms/pdca/

Martin, A., Raponi, S., Combe, T., & Di Pietro, R. (2018). Docker ecosystem – Vulnerability Analysis. Computer Communications, 122, 30–43. https://doi.org/10.1016/j.comcom.2018.03.011

Martin, D. (2013). Writing a cybersecurity report. Dradis Academy. Retrieved December 8, 2022, from https://dradisframework.com/academy/industry/infosec-101/writing-asecurity-report.html

Nationaal Cyber Security Centrum. (2022, October 28). Reporting a vulnerability (CVD).

National Cyber Security Centre. Retrieved December 19, 2022, from https://english.ncsc.nl/contact/reporting-a-vulnerability-cvd

OWASP. (2017, June). Docker Security - OWASP Cheat Sheet Series. owasp.org. Retrieved December 10, 2022, from https://cheatsheetseries.owasp.org/cheatsheets/Docker_Security_Cheat_Sheet.html

OWASP Foundation. (2020, December). OWASP Web Security Testing Guide. owasp.org. Retrieved December 5, 2022, from https://owasp.org/www-project-web-security-testingguide/

PortSwigger. (2022, December). Dastardly, from Burp Suite. Retrieved December 10, 2022, from https://portswigger.net/burp/documentation/dastardly

ProjectDiscovery. (2022, November). ProjectDiscovery/Subfinder: Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. GitHub. Retrieved December 12, 2022, from https://github.com/projectdiscovery/subfinder

Roser, C. (2021, April 5). The Key to Lean – Plan, Do, Check, Act! AllAboutLean.com. Retrieved December 8, 2022, from https://www.allaboutlean.com/pdca/

Ross, M. (2022). Reflected Cross-Site Scripting Report Template.

Santiago. (2022). Reconmap Features: All-in-one pentesting collaboration platform.

Reconmap.com. Retrieved November 26, 2022, from https://reconmap.com/features

Scrum.org. (2022). What is Scrum? Scrum.org, the Home of Scrum. Retrieved December 18, 2022, from https://www.scrum.org/resources/what-is-scrum

Selenius, T. (2021, February 13). Web Application Security Checklist. AppSecMonkey.com. Retrieved December 11, 2022, from https://www.appsecmonkey.com/blog/webapplication-security-checklist

Shanley, A., & Johnstone, M. (2015, December). Selection of penetration testing methodologies: A comparison and evaluation. Research Online. Retrieved December 11, 2022, from https://ro.ecu.edu.au/ism/182/

VisualParadigm. (2022, December). Free Network Diagram Software. Visual-Paradigm.com. Retrieved December 14, 2022, from https://online.visualparadigm.com/diagrams/solutions/free-network-diagram-software