top of page

Operating System for Penetration Testing:

 

https://www.kali.org/

http://www.backtrack-linux.org/

http://www.pentoo.ch/

 

Software for Dependable Systems: Sufficient Evidence? | The National Academies Press:

 

http://www.nap.edu/catalog/11923/software-for-dependable-systems-sufficient-evidence

 

Practicing and simulating SQL injection:


http://www.ciso.in/2011/12/23/10-vulnerable-web-applications-for-security-testing/

 

http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html

 

Waf bypass:

 

http://www.securityidiots.com/Web-Pentest/WAF-Bypass/waf-bypass-guide-part-1.html

 

http://translate.wooyun.io/2015/09/01/Bypass-WAF-Cookbook.html

 

http://raijee1337.blogspot.com/2015/05/union-based-sql-injection-waf-bypass.html

 

http://wafbypass.me/w/index.php/Bypass_Techniques

 

https://forum.bugcrowd.com/t/sqlmap-tamper-scripts-sql-injection-and-waf-bypass/423

 

http://hackingparadisesn.blogspot.com/2015/06/how-to-bypass-sql-injections-waf.html

 

http://www.rafayhackingarticles.net/2015/04/sucuri-waf-xss-filter-bypass.html

 

https://www.linkedin.com/pulse/bypass-waf-cookbook-mayur-agnihotri

 

Tool Based:

 

https://support.portswigger.net/customer/portal/articles/1965677-using-burp-to-test-for-injection-flaws

 

http://resources.infosecinstitute.com/best-free-and-open-source-sql-injection-tools/

 

https://www.owasp.org/index.php/Appendix_A:_Testing_Tools

 

http://blog.checkpoint.com/2015/05/07/latest-sql-injection-trends/

 

Manual SQL Injection:

 

http://www.kalitutorials.net/2015/02/blind-sql-injection.html

 

http://www.guru99.com/learn-sql-injection-with-practical-example.html

 

https://www.hackingloops.com/web-application-penetration-testing-manual-sql-injection.html

 

https://www.cybrary.it/0p3n/howto-manually-sql-injection-using-union-select-method-guide/

 

https://media.blackhat.com/bh-us-12/Briefings/Cutlip/BH_US_12_Cutlip_SQL_Exploitation_WP.pdf

 

Internet of Things Referances: 

 

http://www.itworldcanada.com/slideshow/10-internet-of-things-use-cases-that-have-already-become-cliches

 

http://www.cisco.com/web/about/security/intelligence/iot_framework.html

 

http://www.sciencedirect.com/science/article/pii/S1389128614003971

 

PfSense:

 

https://doc.pfsense.org/index.php/Example_basic_configuration

 

Cyber Security top 500:

 

http://cybersecurityventures.com/cybersecurity-500/#home/?view_1_sort=field_1%7Casc

 

Wolfram Data Drop and the Raspberry Pi for Education:

 

http://community.wolfram.com/groups/-/m/t/453169?p_p_auth=KX9HCwNf

 

 

bottom of page