top of page
Operating System for Penetration Testing:
https://www.kali.org/
http://www.backtrack-linux.org/
http://www.pentoo.ch/
Software for Dependable Systems: Sufficient Evidence? | The National Academies Press:
http://www.nap.edu/catalog/11923/software-for-dependable-systems-sufficient-evidence
Practicing and simulating SQL injection:
http://www.ciso.in/2011/12/23/10-vulnerable-web-applications-for-security-testing/
http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html
Waf bypass:
http://www.securityidiots.com/Web-Pentest/WAF-Bypass/waf-bypass-guide-part-1.html
http://translate.wooyun.io/2015/09/01/Bypass-WAF-Cookbook.html
http://raijee1337.blogspot.com/2015/05/union-based-sql-injection-waf-bypass.html
http://wafbypass.me/w/index.php/Bypass_Techniques
https://forum.bugcrowd.com/t/sqlmap-tamper-scripts-sql-injection-and-waf-bypass/423
http://hackingparadisesn.blogspot.com/2015/06/how-to-bypass-sql-injections-waf.html
http://www.rafayhackingarticles.net/2015/04/sucuri-waf-xss-filter-bypass.html
https://www.linkedin.com/pulse/bypass-waf-cookbook-mayur-agnihotri
Tool Based:
https://support.portswigger.net/customer/portal/articles/1965677-using-burp-to-test-for-injection-flaws
http://resources.infosecinstitute.com/best-free-and-open-source-sql-injection-tools/
https://www.owasp.org/index.php/Appendix_A:_Testing_Tools
http://blog.checkpoint.com/2015/05/07/latest-sql-injection-trends/
Manual SQL Injection:
http://www.kalitutorials.net/2015/02/blind-sql-injection.html
http://www.guru99.com/learn-sql-injection-with-practical-example.html
https://www.hackingloops.com/web-application-penetration-testing-manual-sql-injection.html
https://www.cybrary.it/0p3n/howto-manually-sql-injection-using-union-select-method-guide/
https://media.blackhat.com/bh-us-12/Briefings/Cutlip/BH_US_12_Cutlip_SQL_Exploitation_WP.pdf
Internet of Things Referances:
http://www.itworldcanada.com/slideshow/10-internet-of-things-use-cases-that-have-already-become-cliches
http://www.cisco.com/web/about/security/intelligence/iot_framework.html
http://www.sciencedirect.com/science/article/pii/S1389128614003971
PfSense:
https://doc.pfsense.org/index.php/Example_basic_configuration
Cyber Security top 500:
http://cybersecurityventures.com/cybersecurity-500/#home/?view_1_sort=field_1%7Casc
Wolfram Data Drop and the Raspberry Pi for Education:
http://community.wolfram.com/groups/-/m/t/453169?p_p_auth=KX9HCwNf
bottom of page