References
- Luo, C., Bo, W., Kun, H., & Yuesheng, L. (2020). Study on Software Vulnerability Characteristics and Its Identification Method. Mathematical Problems in Engineering, 2020.
- "What is Ethical Hacking | Types of Ethical Hacking | EC-Council." https://www.eccouncil.org/ethical-hacking/ (accessed May 11, 2021).
- S. Patil, A. Jangra, M. Bhale, A. Raina and P. Kulkarni, "Ethical hacking: The need for cyber security," 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), Chennai, India, 2017, pp. 1602-1606, doi: 10.1109/ICPCSI.2017.8391982.
- Bertoglio, Daniel & Zorzo, Avelino. (2017). Overview and open issues on penetration test. Journal of the Brazilian Computer Society. 23. 10.1186/s13173-017- 0051-1.
- Bacudio, Aileen & Yuan, Xiaohong & Chu, Bei & Jones, Monique. (2011). An Overview of Penetration Testing. International Journal of Network Security & Its Applications. 3. 19-38. 10.5121/ijnsa.2011.3602.
- "13 Physical Penetration Testing Methods (That Actually Work)," PurpleSec, Jul. 17, 2019. https://purplesec.us/physical-penetration-testing/ (accessed May 11, 2021).
- Mohino, de Higuera, Juan-Ramon & Montalvo, Juan Antonio. (2019). The Application of a New Secure Software Development Life Cycle (S-SDLC) with Agile Methodologies. Electronics. 8. 1218. 10.3390/electronics8111218.
- c, Nagadeepa & Mohan, Reenu. (2019). Ethical Hacking: Cyber-Crime Survival in the Digital World. International Journal of Recent Technology and Engineering. 8. 10.35940/ijrte. D4612.118419.
- Nishadhi, Nimesha. (2020). Ethical Hacking as A Method to Enhance Information Security. Cyber attack protection methodology.
- Shi, Junyan & Li, Juanjuan. (2016). The Security and Protection Strategy Study of Computer Network Information. 10.2991/icence-16.2016.7.
- "Kali Linux | Penetration Testing and Ethical Hacking Linux Distribution," Kali Linux. https://www.kali.org/ (accessed May 10, 2021).
- "Parrot Security." https://www.parrotsec.org/ (accessed Mar. 31, 2021).
- "Homepage," BackBox.org. https://www.backbox.org/ (accessed May 10, 2021).
- "BlackArch Linux - Penetration Testing Distribution." https://blackarch.org/ (accessed May 10, 2021).
- "Security Lab." https://labs.fedoraproject.org/en/security/ (accessed May 10, 2021)."Dracos Linux." https://dracos-linux.org/ (accessed May 10, 2021).
- "Bugtraq -ArchiveOS." https://archiveos.org/bugtraq/ (accessed May 10, 2021).
- "CAINE Live USB/DVD - computer forensics digital forensics." https://www.caine-live.net/ (accessed May 10, 2021).
- "Samurai Web Testing Framework - SecTools Top Network Security Tools." https://sectools.org/tool/samurai/ (accessed May 10, 2021).
- "Network Security Toolkit (NST 32)." https://www.networksecuritytoolkit.org/nst/index.htm (accessed May 10, 2021).
- "Demon Linux." https://www.demonlinux.com/ (accessed May 10, 2021).
- "ArchStrike." https://archstrike.org/ (accessed May 10, 2021).
- "ANDRAX Hackers Platform." https://andrax.thecrackertechnology.com/ (accessed May 10, 2021)
- "OWASP ZAP Zed Attack Proxy OWASP." https://owasp.org/www-project-zap/ (accessed May 11, 2021).
- "Netsparker | Web Application Security For Enterprise."https://www.netsparker.com/?utm_source=guru99&utm_medium=referral&utm_content=product+description&utm_campaign=generic+advert (accessed May 11, 2021).
- "Acunetix | Web Application Security Scanner," Acunetix. https://www.acunetix.com/ (accessed May 11, 2021).
- "Intruder | An Effortless Vulnerability Scanner." https://www.intruder.io/?utm_source=referral&utm_campaign=guru99_penetration_testing_tools (accessed May 11, 2021).
- "Web Application Scanning (WAS) - Vulnerability Scanning by Indusface." https://www.indusface.com/web-application-scanning.php (accessed May 11, 2021).
- "Intrusion Detection Software - IDS Security System | SolarWinds." https://www.solarwinds.com/security-event-manager/use-cases/intrusion-detection-software (accessed May 11, 2021).
- "Take a tour | w3af - Open Source Web Application Security Scanner." http://w3af.org/take-a-tour (accessed May 11, 2021).
- "Metasploit | Penetration Testing Software, Pen Testing Security," Metasploit. https://www.metasploit.com/ (accessed May 11, 2021).
- "Nmap: the Network Mapper - Free Security Scanner." https://nmap.org/ (accessed May 11, 2021).
- "Wireshark.Go Deep." https://www.wireshark.org/ (accessed May 11, 2021).
- "OpenVAS - OpenVAS - Open Vulnerability Assessment Scanner." https://www.openvas.org/ (accessed May 11, 2021).
- "IronWASP: An Introduction - Infosec Resources." https://resources.infosecinstitute.com/topic/ironwasp-part-1-2/ (accessed May 11, 2021).
- g0tmi1k, "Nikto." https://tools.kali.org/information-gathering/nikto (accessed May 11, 2021).
- "sqlmap: automatic SQL injection and database takeover tool." https//sqlmap.org/ (accessed May 11, 2021).
- "sqlninja - a SQL Server injection & takeover tool." http://sqlninja.sourceforge.net/ (accessed May 11, 2021).
- "Wapiti : a Free and Open-Source web-application vulnerability scanner in Python for Windows, Linux, BSD, OSX." https://wapiti.sourceforge.io/ (accessed May 11, 2021).
- "Dradis Community Edition | Dradis Framework." https://dradisframework.com/ce/ (accessed May 11, 2021).
- "Ettercap Home Page." https://www.ettercap-project.org/ (accessed May 11, 2021).
- "Burp Suite - Application Security Testing Software - PortSwigger." https://portswigger.net/burp (accessed May 11, 2021).
- "Arachni - Web Application Security Scanner Framework," Arachni - Web Application Security Scanner Framework. https://www.arachni-scanner.com/ (accessed May 11, 2021).