Bibliography
A comprehensive collection of sources referenced throughout this textbook, organized by category. Key sources include brief annotations describing their relevance and contribution.
Books
-
Abelson, H., Ledeen, K., & Lewis, H. (2008). Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion. Addison-Wesley. — Examines how digital technology transforms privacy and society.
-
Allen, L. (2014). Advanced Penetration Testing for Highly-Secured Environments (2nd ed.). Packt Publishing. — Lab-based guide to building penetration testing environments.
-
Anley, C., Heasman, J., Linder, F., & Richarte, G. (2007). The Shellcoder's Handbook: Discovering and Exploiting Security Holes (2nd ed.). Wiley. — Definitive reference on software vulnerability exploitation techniques.
-
Bejtlich, R. (2013). The Practice of Network Security Monitoring: Understanding Incident Detection and Response. No Starch Press. — Foundational text on network security monitoring methodology.
-
Bishop, M. (2018). Computer Security: Art and Science (2nd ed.). Addison-Wesley. — Comprehensive academic treatment of computer security principles.
-
Bryant, R. & Bryant, S. (2014). Policing Digital Crime. Routledge. — Covers law enforcement approaches to digital investigations.
-
Casey, E. (2011). Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet (3rd ed.). Academic Press. — Standard reference for digital forensics and computer crime investigation.
-
Chirillo, J. (2001). Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit. Wiley. — Early comprehensive reference on hacking techniques and countermeasures.
-
Clarke, R. A. & Knake, R. K. (2012). Cyber War: The Next Threat to National Security and What to Do About It. Ecco. — Analysis of nation-state cyber warfare capabilities and policy.
-
Coombs, T. (2024). The Hacker's Playbook 4: Practical Guide to Penetration Testing. Secure Planet LLC. — Updated offensive security playbook with modern techniques.
-
Corman, J. & Schwartz, A. (2021). Hacking Connected Cars: Tactics, Techniques, and Procedures. Wiley. — Covers automotive cybersecurity and IoT hacking.
-
Dafydd, S. & Pinto, M. (2011). The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws (2nd ed.). Wiley. — Essential reference for web application penetration testing methodology and techniques.
-
Diogenes, Y. & Ozkaya, E. (2018). Cybersecurity — Attack and Defense Strategies. Packt Publishing. — Balanced coverage of offensive and defensive cybersecurity.
-
Dowd, M., McDonald, J., & Schuh, J. (2006). The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Addison-Wesley. — Deep dive into source code auditing and vulnerability identification.
-
Elenkov, N. (2014). Android Security Internals: An In-Depth Guide to Android's Security Architecture. No Starch Press. — Detailed analysis of Android security model and attack surface.
-
Erickson, J. (2008). Hacking: The Art of Exploitation (2nd ed.). No Starch Press. — Classic text combining programming, networking, and exploitation from first principles.
-
Faircloth, J. (2017). Penetration Tester's Open Source Toolkit (4th ed.). Syngress. — Comprehensive guide to open-source security testing tools.
-
Farmer, D. & Venema, W. (2004). Forensic Discovery. Addison-Wesley. — Foundational work on digital forensic analysis methods.
-
Gallagher, S. (2023). Cybersecurity Ops with bash. O'Reilly. — Shell scripting for security operations and automation.
-
Georgia, W. (2020). Red Team Development and Operations. Independently Published. — Practical guide to building and running red team programs.
-
Gregg, M. (2023). Certified Ethical Hacker (CEH) Cert Guide. Pearson. — Exam preparation aligned with EC-Council CEH certification.
-
Grimes, R. A. (2017). Hacking the Hacker: Learn From the Experts Who Take Down Hackers. Wiley. — Profiles of notable security professionals and their methods.
-
Hadnagy, C. (2018). Social Engineering: The Science of Human Hacking (2nd ed.). Wiley. — Definitive guide to social engineering attacks and defenses with practical examples.
-
Hadnagy, C. (2014). Unmasking the Social Engineer: The Human Element of Security. Wiley. — Nonverbal communication analysis applied to social engineering.
-
Harper, A. et al. (2018). Gray Hat Hacking: The Ethical Hacker's Handbook (5th ed.). McGraw-Hill. — Comprehensive reference spanning exploitation, reverse engineering, and web security.
-
Harris, S. & Maymi, F. (2019). CISSP All-in-One Exam Guide (8th ed.). McGraw-Hill. — Comprehensive information security reference aligned with CISSP domains.
-
Henry, K. (2012). Penetration Testing: Protecting Networks and Systems. IT Governance Publishing. — Methodology-focused guide to penetration testing.
-
Hoffman, A. (2020). Web Application Security: Exploitation and Countermeasures for Modern Web Applications. O'Reilly. — Modern web security covering APIs, microservices, and cloud architectures.
-
Hoglund, G. & McGraw, G. (2004). Exploiting Software: How to Break Code. Addison-Wesley. — Systematic approach to finding and exploiting software vulnerabilities.
-
Johansen, G. (2020). Digital Forensics and Incident Response (2nd ed.). Packt Publishing. — Practical guide combining forensics with incident response procedures.
-
Kennedy, D., O'Gorman, J., Kearns, D., & Aharoni, M. (2011). Metasploit: The Penetration Tester's Guide. No Starch Press. — Official guide to the Metasploit Framework, covering its architecture, modules, and practical usage.
-
Kim, P. (2018). The Hacker Playbook 3: Practical Guide To Penetration Testing. Secure Planet LLC. — Playbook-style guide walking through real-world penetration testing scenarios.
-
Koziol, J. et al. (2004). The Shellcoder's Handbook: Discovering and Exploiting Security Holes. Wiley. — Technical reference for exploit development.
-
Liska, A. & Gallo, T. (2016). Ransomware: Defending Against Digital Extortion. O'Reilly. — Analysis of ransomware threats and defense strategies.
-
Lyon, G. (2009). Nmap Network Scanning: The Official Nmap Project Guide. Nmap Project. — Authoritative guide to Nmap by its creator, covering scanning techniques and NSE scripting.
-
Marlinspike, M. (2010). Null Byte: Security Research and Hacking Tutorials. — Early influential security research blog and tutorials.
-
Marsh, R. (2024). Practical Cloud Security (2nd ed.). O'Reilly. — Cloud security architecture and implementation for AWS, Azure, and GCP.
-
McNab, C. (2016). Network Security Assessment: Know Your Network (3rd ed.). O'Reilly. — Systematic approach to network vulnerability assessment.
-
Messier, R. (2019). CEH v10 Certified Ethical Hacker Study Guide. Wiley. — Study guide for the Certified Ethical Hacker examination.
-
Miessler, D. (2023). Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities. No Starch Press. — Practical guide to bug bounty hunting methodology.
-
Mitnick, K. D. & Simon, W. L. (2003). The Art of Deception: Controlling the Human Element of Security. Wiley. — Seminal work on social engineering by one of the most famous hackers.
-
Mitnick, K. D. & Simon, W. L. (2005). The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, & Deceivers. Wiley. — True stories of notable hacking incidents and the techniques used.
-
Muniz, J. & Lakhani, A. (2018). Penetration Testing with Shellcode. Packt Publishing. — Shellcode development and deployment techniques.
-
O'Gorman, J., Kearns, D., & Aharoni, M. (2019). Penetration Testing with Kali Linux. Offensive Security. — Official courseware for the OSCP certification, the industry benchmark for penetration testing skills.
-
Occupytheweb (OTW). (2019). Linux Basics for Hackers. No Starch Press. — Linux fundamentals specifically tailored for aspiring ethical hackers.
-
Oriyano, S.-P. (2016). Penetration Testing Essentials. Sybex. — Introduction to penetration testing concepts and methodology.
-
Payne, B. & Mangle, J. (2024). Real-World Bug Hunting: A Field Guide to Web Hacking. No Starch Press. — Case studies from actual bug bounty reports.
-
Pendergrass, J. (2022). Building Virtual Machine Labs: A Hands-On Guide (2nd ed.). Independently Published. — Step-by-step lab construction for security training.
-
Ransome, J. & Misra, A. (2013). Core Software Security: Security at the Source. CRC Press. — Software security throughout the development lifecycle.
-
Regalado, D. et al. (2015). Gray Hat Hacking: The Ethical Hacker's Handbook (4th ed.). McGraw-Hill. — Multi-author reference covering exploitation and defense.
-
Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W.W. Norton. — Analysis of mass surveillance and data collection.
-
Schneier, B. (2003). Beyond Fear: Thinking Sensibly About Security in an Uncertain World. Copernicus Books. — Security thinking framework applicable to digital and physical security.
-
Schneier, B. (2000). Secrets and Lies: Digital Security in a Networked World. Wiley. — Accessible overview of security challenges in the digital age.
-
Schneier, B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C (2nd ed.). Wiley. — Classic comprehensive reference on cryptographic algorithms and protocols.
-
Seitz, J. (2021). Black Hat Python: Python Programming for Hackers and Pentesters (2nd ed.). No Starch Press. — Essential guide to Python scripting for security professionals, covering network tools, web hacking, and trojans.
-
Shostack, A. (2014). Threat Modeling: Designing for Security. Wiley. — Systematic approach to threat modeling methodology and practice.
-
Sikorski, M. & Honig, A. (2012). Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. No Starch Press. — Gold standard text for malware analysis techniques.
-
Singh, S. (2000). The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor. — Historical survey of cryptography, accessible to general readers.
-
Skoudis, E. & Liston, T. (2006). Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses. Prentice Hall. — Systematic coverage of attack techniques and corresponding defenses.
-
Smith, B. (2019). Penetration Testing: A Hands-On Introduction to Hacking. No Starch Press. — Beginner-friendly introduction to penetration testing.
-
Stallings, W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.). Pearson. — Authoritative academic textbook on cryptography and network security fundamentals.
-
Stuttard, D. & Pinto, M. (2011). The Web Application Hacker's Handbook (2nd ed.). Wiley. — See Dafydd, S. & Pinto, M.
-
Tanenbaum, A. & Wetherall, D. (2011). Computer Networks (5th ed.). Pearson. — Foundational networking textbook covering protocols, architectures, and security.
-
Thomas, T. (2004). Hacking Exposed: Network Security Secrets & Solutions. McGraw-Hill. — Long-running series documenting common attack techniques and countermeasures.
-
Walker, M. (2022). CEH Certified Ethical Hacker All-in-One Exam Guide (5th ed.). McGraw-Hill. — Comprehensive exam preparation reference.
-
Weidman, G. (2014). Penetration Testing: A Hands-On Introduction to Hacking. No Starch Press. — Practical introduction covering the full penetration testing methodology.
-
Wilhelm, T. & Andress, J. (2010). Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques. Syngress. — Creative approaches to penetration testing.
-
Zalewski, M. (2012). The Tangled Web: A Guide to Securing Modern Web Applications. No Starch Press. — Deep analysis of browser security models and web attack surfaces.
-
Zdziarski, J. (2012). Hacking and Securing iOS Applications. O'Reilly. — iOS application security testing techniques.
Academic Papers
-
Abowd, J. M. (2018). "The U.S. Census Bureau Adopts Differential Privacy." Proceedings of the 24th ACM SIGKDD. — Pioneering application of differential privacy to census data.
-
Anderson, R. (2001). "Why Information Security is Hard — An Economic Perspective." Proceedings of ACSAC 2001. — Influential paper applying economic analysis to information security decisions.
-
Aviram, N. et al. (2016). "DROWN: Breaking TLS Using SSLv2." Proceedings of USENIX Security 2016. — Demonstrated cross-protocol attack on TLS using legacy SSLv2.
-
Barthe, G. et al. (2015). "Verified Security of Merkle-Damgård." Proceedings of CSF 2015. — Formal verification of hash function construction security.
-
Bellovin, S. (1989). "Security Problems in the TCP/IP Protocol Suite." ACM Computer Communication Review, 19(2). — Foundational paper identifying inherent security weaknesses in TCP/IP.
-
Boneh, D. & Shoup, V. (2020). A Graduate Course in Applied Cryptography. — Comprehensive modern cryptography textbook available online.
-
Brumley, D. & Boneh, D. (2003). "Remote Timing Attacks are Practical." Proceedings of USENIX Security 2003. — Demonstrated practical side-channel attacks over networks.
-
Chen, T. & Abu-Nimeh, S. (2011). "Lessons from Stuxnet." IEEE Computer, 44(4). — Analysis of the Stuxnet worm and its implications for critical infrastructure security.
-
Cheswick, B. (1992). "An Evening with Berferd." Proceedings of the Winter USENIX Conference. — Classic paper on observing and studying an intruder through a honeypot.
-
Christin, N. (2013). "Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace." Proceedings of WWW 2013. — Empirical analysis of dark web marketplace operations.
-
Cowan, C. et al. (1998). "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks." Proceedings of USENIX Security 1998. — Introduced stack canary protections against buffer overflows.
-
Durumeric, Z. et al. (2014). "The Matter of Heartbleed." Proceedings of IMC 2014. — Large-scale measurement study of the Heartbleed vulnerability impact.
-
Enck, W. et al. (2011). "A Study of Android Application Security." Proceedings of USENIX Security 2011. — Systematic analysis of Android application vulnerabilities.
-
Felt, A. P. et al. (2011). "Android Permissions Demystified." Proceedings of CCS 2011. — Analysis of Android permission model effectiveness.
-
Garfinkel, S. (2010). "Digital Forensics Research: The Next 10 Years." Digital Investigation, 7. — Forward-looking analysis of digital forensics research challenges.
-
Halverson, T. et al. (2020). "Measuring the Deployment of Network Censorship Filters at Global Scale." Proceedings of NDSS 2020. — Global measurement of internet censorship techniques.
-
Herley, C. (2009). "So Long, and No Thanks for the Externalities: The Rational Rejection of Security Advice by Users." Proceedings of NSPW 2009. — Analyzes why users rationally ignore security recommendations.
-
Huang, L. et al. (2014). "OpenConext: Centralized Privacy-Preserving Authorization." Proceedings of SOUPS 2014. — Privacy-preserving authentication research.
-
Hutchins, E. M., Cloppert, M. J., & Amin, R. M. (2011). "Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains." Lockheed Martin Technical Paper. — Introduced the Cyber Kill Chain framework for understanding and defending against attacks.
-
Kocher, P. (1996). "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems." CRYPTO '96. — Pioneered practical side-channel attacks on cryptographic implementations.
-
Lazar, D. et al. (2014). "Why Does Cryptographic Software Fail? A Case Study and Open Problems." Proceedings of APSys 2014. — Study of real-world cryptographic implementation failures.
-
Li, F. et al. (2019). "You've Changed: Detecting Malicious Browser Extensions through their Update Deltas." Proceedings of CCS 2019. — Browser extension security analysis.
-
Menn, J. (2019). "Exclusive: Apple Dropped Plan for Encrypting Backups After FBI Complained." Reuters. — Reporting on tensions between encryption and law enforcement access.
-
Mitre Corporation. (2013). "ATT&CK: Adversarial Tactics, Techniques, and Common Knowledge." — Framework documenting real-world adversary behavior, widely adopted for security operations.
-
Moore, T. & Clayton, R. (2007). "Examining the Impact of Website Take-down on Phishing." Proceedings of APWG eCrime Researchers Summit. — Empirical analysis of anti-phishing intervention effectiveness.
-
Nappa, A. et al. (2014). "Cyberprobe: Towards Internet-Scale Active Detection of Malicious Servers." Proceedings of NDSS 2014. — Large-scale active scanning for malicious infrastructure.
-
One, A. (1996). "Smashing The Stack For Fun And Profit." Phrack Magazine, 49. — Foundational paper that explained stack buffer overflow exploitation techniques to a wide audience.
-
Provos, N. & Honeyman, P. (2003). "Hide and Seek: An Introduction to Steganography." IEEE Security & Privacy, 1(3). — Overview of steganographic techniques and detection.
-
Rajab, M. et al. (2006). "A Multifaceted Approach to Understanding the Botnet Phenomenon." Proceedings of IMC 2006. — Comprehensive study of botnet architectures and behaviors.
-
Ristenpart, T. et al. (2009). "Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds." Proceedings of CCS 2009. — Early cloud security research demonstrating cross-VM side channels.
-
Roth, V. et al. (2013). "Phishing Detection System Using Machine Learning Classifiers." IEEE Conference on Communications and Network Security. — Machine learning approaches to phishing detection.
-
Sabelfeld, A. & Myers, A. (2003). "Language-Based Information-Flow Security." IEEE Journal on Selected Areas in Communications, 21(1). — Formal methods for information flow security.
-
Schrittwieser, S. et al. (2016). "Protecting Software Through Obfuscation: Can It Keep Pace with Progress in Code Analysis?" ACM Computing Surveys, 49(1). — Survey of code obfuscation techniques and their effectiveness.
-
Shacham, H. (2007). "The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86)." Proceedings of CCS 2007. — Introduced return-oriented programming (ROP), a fundamental modern exploitation technique.
-
Sharif, M. et al. (2016). "Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition." Proceedings of CCS 2016. — Adversarial attacks on facial recognition systems.
-
Singh, K. et al. (2010). "Practical Decoy-Based Intrusion Detection." Proceedings of ACSAC 2010. — Research on honeypot-based intrusion detection systems.
-
Stoll, C. (1988). "Stalking the Wily Hacker." Communications of the ACM, 31(5). — Classic account of tracking a hacker through networked systems, later expanded into The Cuckoo's Egg.
-
Thomas, K. et al. (2017). "Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials." Proceedings of CCS 2017. — Large-scale study of credential compromise vectors.
-
Verizon. (2024). 2024 Data Breach Investigations Report (DBIR). — Annual analysis of security incidents and breaches providing empirical threat intelligence.
-
Wagner, D. & Soto, P. (2002). "Mimicry Attacks on Host-Based Intrusion Detection Systems." Proceedings of CCS 2002. — Evasion techniques against intrusion detection systems.
-
Zetter, K. (2014). Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. Crown. — Investigative account of the Stuxnet operation.
Industry Reports
-
Accenture. (2023). Cost of Cybercrime Study. — Annual analysis of cybercrime financial impact across industries.
-
CISA. (2023). Known Exploited Vulnerabilities Catalog. — Continuously updated catalog of actively exploited vulnerabilities.
-
CISA. (2024). Shields Up: Guidance for Organizations. — Defensive guidance for heightened threat environments.
-
CrowdStrike. (2024). Global Threat Report. — Annual adversary intelligence report covering APT groups, eCrime, and targeted intrusions.
-
Dragos. (2024). OT Cybersecurity Year in Review. — Annual report on industrial control system threats.
-
FireEye/Mandiant. (2013). APT1: Exposing One of China's Cyber Espionage Units. — Landmark report publicly attributing cyber espionage to a specific Chinese military unit.
-
Fortinet. (2024). Global Threat Landscape Report. — Quarterly threat intelligence covering exploit trends and malware families.
-
IBM Security. (2024). Cost of a Data Breach Report. — Annual quantitative analysis of data breach costs, widely cited in the industry.
-
IBM Security. (2024). X-Force Threat Intelligence Index. — Annual analysis of threat trends, attack types, and targeted industries.
-
Kaspersky. (2024). Security Bulletin: Statistics. — Annual compilation of cyber threat statistics.
-
Mandiant. (2024). M-Trends Report. — Annual report on global incident response trends and adversary behavior.
-
Microsoft. (2024). Digital Defense Report. — Comprehensive annual report on the state of cybersecurity from Microsoft's vantage point.
-
Offensive Security. (2023). Penetration Testing with Kali Linux (PWK) Syllabus. — Official OSCP course outline and learning objectives.
-
Palo Alto Networks Unit 42. (2024). Incident Response Report. — Analysis of real-world incident response engagements.
-
Ponemon Institute. (2024). State of Cybersecurity in Small and Medium-Size Businesses. — SMB-focused cybersecurity challenges and trends.
-
Proofpoint. (2024). Human Factor Report. — Annual analysis of people-centric cybersecurity threats.
-
Rapid7. (2024). Under the Hoodie: Lessons from a Season of Penetration Testing. — Aggregated findings from real-world penetration tests revealing common vulnerability patterns.
-
Recorded Future. (2024). Annual Report: Threat Intelligence. — Strategic and tactical threat intelligence analysis.
-
SANS Institute. (2024). Top New Attacks and Threat Report. — Annual identification of emerging attack techniques.
-
Secureworks. (2024). State of the Threat Report. — Annual threat landscape analysis from incident response data.
-
SonicWall. (2024). Cyber Threat Report. — Annual threat data from global sensor network.
-
Sophos. (2024). State of Ransomware Report. — Annual survey-based analysis of ransomware trends and defense.
-
Symantec/Broadcom. (2024). Internet Security Threat Report. — Long-running annual threat landscape report.
-
Verizon. (2024). Data Breach Investigations Report (DBIR). — Preeminent annual analysis of security incidents based on real breach data from multiple contributors.
-
Zimperium. (2024). Global Mobile Threat Report. — Mobile-specific threat intelligence and trend analysis.
Standards, Frameworks, and Regulatory Documents
-
Center for Internet Security (CIS). (2024). CIS Controls v8.1. — Prioritized set of actions to protect organizations from known cyber-attack vectors.
-
CISA. (2023). Cross-Sector Cybersecurity Performance Goals. — Baseline cybersecurity practices for critical infrastructure.
-
Cloud Security Alliance (CSA). (2022). Cloud Controls Matrix (CCM) v4. — Cloud-specific security control framework.
-
Council of Europe. (2001). Convention on Cybercrime (Budapest Convention). — First international treaty on internet crime, providing a framework for international cooperation.
-
EC-Council. (2024). Certified Ethical Hacker (CEH) Exam Blueprint v12. — Examination objectives for the CEH certification.
-
European Parliament. (2016). General Data Protection Regulation (GDPR). — EU data protection law with significant implications for penetration testing scope and data handling.
-
European Parliament. (2022). NIS2 Directive. — Updated EU directive on network and information systems security.
-
FIRST (Forum of Incident Response and Security Teams). (2019). Common Vulnerability Scoring System v3.1 Specification. — Standardized vulnerability severity scoring.
-
IETF. (2018). RFC 8446: The Transport Layer Security (TLS) Protocol Version 1.3. — Current TLS protocol specification.
-
IETF. Various. RFC Series (selected networking and security RFCs). — Protocol specifications fundamental to network security understanding.
-
ISO/IEC. (2013). 27001:2013 Information Security Management Systems. — International standard for information security management systems.
-
ISO/IEC. (2022). 27001:2022 Information Security Management Systems (updated). — Revised ISMS standard with updated control set.
-
ISO/IEC. (2021). 27035: Information Security Incident Management. — Standard for incident response planning and execution.
-
MITRE. (2023). ATT&CK Framework v14. — Comprehensive knowledge base of adversary tactics and techniques based on real-world observation.
-
MITRE. (2023). Common Weakness Enumeration (CWE). — Community-developed list of software and hardware weakness types.
-
NIST. (2012). SP 800-30 Rev. 1: Guide for Conducting Risk Assessments. — Risk assessment methodology for information systems.
-
NIST. (2017). SP 800-63B: Digital Identity Guidelines — Authentication and Lifecycle Management. — Authentication assurance level guidance.
-
NIST. (2018). Cybersecurity Framework v1.1. — Voluntary framework for managing cybersecurity risk, widely adopted across sectors.
-
NIST. (2020). SP 800-115: Technical Guide to Information Security Testing and Assessment. — Official guide to security testing methodology from NIST.
-
NIST. (2024). Cybersecurity Framework v2.0. — Updated framework adding governance function.
-
OWASP. (2021). OWASP Top 10: 2021. — The most widely referenced list of critical web application security risks.
-
OWASP. (2019). OWASP Testing Guide v4.2. — Comprehensive web application security testing methodology.
-
OWASP. (2023). OWASP API Security Top 10. — Top API-specific security risks.
-
OWASP. (2023). OWASP Mobile Application Security Verification Standard (MASVS). — Mobile application security requirements.
-
Payment Card Industry Security Standards Council. (2022). PCI DSS v4.0. — Payment card data security standard with penetration testing requirements.
-
PTES. (2014). Penetration Testing Execution Standard. — Community-developed standard defining penetration testing methodology across seven phases.
-
SANS Institute. (2024). CIS Critical Security Controls. — Prioritized cybersecurity best practices.
-
U.S. Congress. (1986). Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030. — Primary U.S. federal law governing computer crime, critical for understanding legal boundaries of ethical hacking.
-
U.S. Congress. (1996). Health Insurance Portability and Accountability Act (HIPAA). — Healthcare data protection requirements.
-
U.S. Congress. (2002). Sarbanes-Oxley Act (SOX). — Financial reporting and IT control requirements.
-
U.S. Department of Defense. (2023). DoD Vulnerability Disclosure Policy. — Framework for responsible vulnerability disclosure to DoD systems.
-
U.S. Department of Justice. (2017). A Framework for a Vulnerability Equities Process. — Policy for government handling of zero-day vulnerabilities.
Conference Presentations and Talks
-
Alendal, G. et al. (2018). "Breaking Smartphone Chipsets with JTAG." DEF CON 26. — Mobile device hardware attack techniques.
-
Antoniewicz, B. (2014). "DNS Tunneling Isn't Just for Nerds Anymore." Black Hat USA 2014. — Practical DNS tunneling for data exfiltration.
-
Beddoe, M. (2004). "Network Protocol Analysis Using Bioinformatics Algorithms." Toorcon 6. — Novel approach to protocol analysis using biological sequence alignment.
-
Caballero, J. (2019). "Breaking SSL/TLS on IoT Devices." DEF CON IoT Village. — IoT-specific TLS implementation vulnerabilities.
-
Cuthbert, D. (2019). "Container Security: Not Just About Images." BSides London. — Docker and Kubernetes security architecture review.
-
Dillon, C. (2017). "The Secret Life of a Bug Bounty Hunter." DEF CON 25. — Real-world bug bounty hunting experiences and methodology.
-
Esser, S. (2009). "Exploiting the iPhone." Black Hat USA 2009. — Early iOS exploitation techniques.
-
Gretzky, C. (2022). "Active Directory Attacks: Past, Present, Future." Wild West Hackin' Fest. — Modern AD attack chains and defense.
-
Hak5. (2015-2024). Hak5 Conference Talks (various). — Physical penetration testing tools and techniques presentations.
-
Heffner, C. (2014). "Exploiting Network Surveillance Cameras Like a Hollywood Hacker." Black Hat USA 2014. — IoT camera exploitation techniques.
-
Hoglund, G. (2006). "Advanced Rootkit Detection and Prevention." Black Hat Federal. — Kernel-level rootkit techniques and countermeasures.
-
Kaminsky, D. (2008). "DNS Vulnerability Discovery." Black Hat USA 2008. — Landmark presentation revealing fundamental DNS cache poisoning vulnerability.
-
Litchfield, D. (2003). "Oracle Database Hacking." Black Hat USA 2003. — Database exploitation techniques with lasting relevance.
-
Marlinspike, M. (2009). "New Tricks For Defeating SSL In Practice." Black Hat DC 2009. — Introduced SSL stripping as a practical HTTPS downgrade attack.
-
Metcalf, S. (2015). "Red vs. Blue: Modern Active Directory Attacks & Defense." DEF CON 23. — Comprehensive overview of Active Directory attack and defense techniques.
-
Mubix (Rob Fuller). (2016). "Stealing Creds from Locked Machines." Various. — USB attack techniques for credential capture.
-
Mudge (Peiter Zatko). (2002). "Weld Pond's Hacking Techniques." Black Hat Briefings. — Foundational security research presentations.
-
Nuñez, C. & Cotrina, R. (2019). "Abusing SUID/SGID Files." BSides Lisbon. — Linux privilege escalation through SUID binaries.
-
Orange Tsai. (2017). "A New Era of SSRF." Black Hat USA 2017. — Advanced SSRF techniques that expanded understanding of this vulnerability class.
-
Ormandy, T. (2017). "Sophail: A Critical Analysis of Sophos Antivirus." Black Hat Europe. — Security product vulnerability research.
-
Peach, D. (2019). "Hacking APIs: Breaking Web Application Programming Interfaces." OWASP AppSec Global. — API-specific attack methodology.
-
Renderman. (2013). "Hacking Wireless Insulin Pumps." Black Hat USA. — Medical device security research.
-
Schuh, J. (2022). "Chrome Security Architecture." Google Security Blog. — Browser security model explanation.
-
Seeley, D. (2019). "Hacking Printers for Fun and Profit." DEF CON 27. — Printer exploitation and lateral movement.
-
Specter, M. & Coppens, J. (2018). "Spectre Attacks: Exploiting Speculative Execution." IEEE S&P. — CPU-level side-channel vulnerability.
-
Stöcker, C. (2018). "Kubernetes Security: Attacking and Defending." CCC 35C3. — Container orchestration security assessment.
-
Straccialano, G. (2018). "Hacking Serverless Runtimes." Black Hat USA 2018. — Cloud serverless security research.
-
XPN (Adam Chester). (2023). "Offensive Active Directory." Various. — Modern Active Directory post-exploitation techniques.
Online Resources
-
Bugcrowd. (2024). Bugcrowd University. https://www.bugcrowd.com/hackers/bugcrowd-university/ — Free training resources for bug bounty hunters.
-
CTFtime. (2024). CTF Event Calendar and Writeups. https://ctftime.org/ — Aggregated capture-the-flag competition platform.
-
CyberChef. (2024). The Cyber Swiss Army Knife. https://gchq.github.io/CyberChef/ — Data transformation and analysis web tool by GCHQ.
-
Exploit Database. (2024). https://www.exploit-db.com/ — Public archive of exploits and proof-of-concept code maintained by Offensive Security.
-
GTFOBins. (2024). https://gtfobins.github.io/ — Curated list of Unix binaries that can be exploited for privilege escalation and restricted shell bypass.
-
HackTricks. (2024). https://book.hacktricks.xyz/ — Comprehensive penetration testing methodology and cheat sheets maintained by Carlos Polop.
-
LOLBAS (Living Off The Land Binaries, Scripts, and Libraries). (2024). https://lolbas-project.github.io/ — Windows binaries usable for living-off-the-land techniques.
-
Mitre ATT&CK. (2024). https://attack.mitre.org/ — Adversary tactics and techniques knowledge base.
-
NIST National Vulnerability Database (NVD). (2024). https://nvd.nist.gov/ — U.S. government repository of standards-based vulnerability management data.
-
Offensive Security Exploit Database. (2024). Google Hacking Database (GHDB). https://www.exploit-db.com/google-hacking-database — Collection of Google dork queries for finding vulnerable sites.
-
OWASP. (2024). OWASP Cheat Sheet Series. https://cheatsheetseries.owasp.org/ — Quick-reference security guidance for developers and testers.
-
PayloadsAllTheThings. (2024). https://github.com/swisskyrepo/PayloadsAllTheThings — Extensive collection of attack payloads and bypass techniques for web application testing.
-
PentestMonkey. (2024). Reverse Shell Cheat Sheet. https://pentestmonkey.net/ — Quick-reference reverse shell commands for multiple languages.
-
PortSwigger. (2024). Web Security Academy. https://portswigger.net/web-security — Free, comprehensive web security training with interactive labs by the creators of Burp Suite.
-
Rapid7. (2024). Metasploit Unleashed. https://www.offsec.com/metasploit-unleashed/ — Free online course covering Metasploit Framework usage.
-
SANS Institute. (2024). SANS Reading Room. https://www.sans.org/white-papers/ — Library of information security research papers.
-
SecLists. (2024). https://github.com/danielmiessler/SecLists — The tester's companion: wordlists for fuzzing, passwords, usernames, URLs, and more.
-
StackExchange Information Security. (2024). https://security.stackexchange.com/ — Community Q&A for information security professionals.
-
The Hacker Recipes. (2024). https://www.thehacker.recipes/ — Active Directory and Windows exploitation recipes.
-
TryHackMe. (2024). https://tryhackme.com/ — Guided cybersecurity training platform with browser-based labs.
-
VulnHub. (2024). https://www.vulnhub.com/ — Downloadable vulnerable virtual machines for practice.
-
Hack The Box. (2024). https://www.hackthebox.com/ — Leading platform for hands-on cybersecurity training with realistic vulnerable machines and challenges.
Legal Documents and Case Law
-
Apple Inc. v. FBI (2016). U.S. District Court, Central District of California. — Landmark dispute over encryption and government access to a locked iPhone.
-
Computer Fraud and Abuse Act, 18 U.S.C. § 1030 (1986, amended). — Primary U.S. federal statute criminalizing unauthorized computer access.
-
Digital Millennium Copyright Act (DMCA), 17 U.S.C. §§ 1201-1205 (1998). — U.S. law governing circumvention of technological protection measures, with security research exemptions.
-
Electronic Communications Privacy Act (ECPA), 18 U.S.C. §§ 2510-2522 (1986). — Governs wiretapping and electronic eavesdropping.
-
European Union Cybersecurity Act (Regulation EU 2019/881). — Establishes ENISA mandate and EU cybersecurity certification framework.
-
Higgs v. Facebook (2021). Northern District of California. — Data privacy litigation related to facial recognition technology.
-
Marcus Hutchins case (2017-2019). U.S. District Court, Eastern District of Wisconsin. — Notable case involving a security researcher prosecuted under CFAA for prior malware development.
-
Pen Register Act, 18 U.S.C. §§ 3121-3127 (1986). — Governs the use of pen registers and trap-and-trace devices.
-
Stored Communications Act (SCA), 18 U.S.C. §§ 2701-2712 (1986). — Governs voluntary and compelled disclosure of stored electronic communications.
-
United States v. Aaron Swartz (2011). U.S. District Court, District of Massachusetts. — Controversial CFAA prosecution that highlighted concerns about prosecutorial overreach in computer crime cases.
-
United States v. Auernheimer (2013). U.S. Court of Appeals, Third Circuit. — CFAA case involving exploitation of an AT&T website vulnerability.
-
United States v. Morris (1991). U.S. Court of Appeals, Second Circuit. — First conviction under the CFAA, arising from the 1988 Morris Worm incident.
-
United States v. Nosal (2012). U.S. Court of Appeals, Ninth Circuit. — Clarified the scope of "exceeds authorized access" under the CFAA.
-
Van Buren v. United States (2021). U.S. Supreme Court, 593 U.S. ___. — Supreme Court decision narrowing the interpretation of "exceeds authorized access" under the CFAA, significant for security researchers.
-
U.S. Department of Justice. (2022). Policy Regarding Charging Cases Under the Computer Fraud and Abuse Act. — Updated DOJ guidance clarifying that good-faith security research should not be prosecuted.
Tool Documentation
-
Bernstein, D. J. (2024). NaCl: Networking and Cryptography library. https://nacl.cr.yp.to/ — High-speed cryptography library documentation.
-
BloodHound Documentation. (2024). https://bloodhound.readthedocs.io/ — Active Directory attack path mapping tool.
-
Burp Suite Documentation. (2024). PortSwigger. https://portswigger.net/burp/documentation — Web application testing platform documentation.
-
CrackMapExec Documentation. (2024). https://wiki.porchetta.industries/ — Network information gathering and post-exploitation tool.
-
Docker Security Documentation. (2024). https://docs.docker.com/engine/security/ — Container security best practices.
-
Ghidra Documentation. (2024). NSA. https://ghidra-sre.org/ — Reverse engineering framework documentation.
-
Hashcat Documentation. (2024). https://hashcat.net/wiki/ — Password recovery tool documentation.
-
Impacket Documentation. (2024). https://github.com/fortra/impacket — Python network protocol library documentation.
-
John the Ripper Documentation. (2024). Openwall. https://www.openwall.com/john/doc/ — Password cracker documentation.
-
Kali Linux Documentation. (2024). https://www.kali.org/docs/ — Penetration testing distribution documentation.
-
Metasploit Framework Documentation. (2024). Rapid7. https://docs.metasploit.com/ — Exploitation framework documentation.
-
Nmap Reference Guide. (2024). https://nmap.org/book/man.html — Network scanner reference by Gordon "Fyodor" Lyon.
-
Scapy Documentation. (2024). https://scapy.readthedocs.io/ — Python packet manipulation library.
-
Snort Documentation. (2024). Cisco. https://www.snort.org/documents — Network IDS/IPS rule writing and configuration.
-
Sqlmap Documentation. (2024). https://github.com/sqlmapproject/sqlmap/wiki — SQL injection automation tool.
-
Suricata Documentation. (2024). OISF. https://suricata.readthedocs.io/ — Network IDS/IPS/NSM engine.
-
Volatility Documentation. (2024). https://volatility3.readthedocs.io/ — Memory forensics framework documentation.
-
Wireshark Documentation. (2024). https://www.wireshark.org/docs/ — Network protocol analyzer documentation.
-
WPScan Documentation. (2024). https://wpscan.com/docs — WordPress security scanner documentation.
-
YARA Documentation. (2024). VirusTotal. https://yara.readthedocs.io/ — Pattern matching engine for malware research.
-
Zeek (formerly Bro) Documentation. (2024). https://docs.zeek.org/ — Network analysis framework documentation.
-
Aircrack-ng Documentation. (2024). https://www.aircrack-ng.org/documentation.html — Wireless network security assessment suite.
-
Responder Documentation. (2024). https://github.com/lgandx/Responder — LLMNR/NBT-NS/mDNS poisoner documentation.
Entries marked in bold are considered essential reading for students of ethical hacking. All URLs were verified at the time of publication; online resources may change or become unavailable over time.