Hacker News
- SQL Injection through HTTP Headers http://resources.infosecinstitute.com/sql-injection-http-headers/ 37 comments
- How Do I Run A Fake Phishing Email Campaign? https://resources.infosecinstitute.com/top-9-free-phishing-simulators/ 11 comments sysadmin
- suggestions for robust steganography app ? https://resources.infosecinstitute.com/steganography-and-tools-to-perform-steganography/#gref 14 comments crypto
- Windows Mobile Application Penetration Testing http://resources.infosecinstitute.com/windows-mobile-application-penetration-testing-part-1-introduction-to-windows-mobile-application-penetration-testing/ 9 comments windowsphone
- NSA's BiOS Backdoor a.k.a. God Mode Malware http://resources.infosecinstitute.com/nsa-bios-backdoor-god-mode-malware-deitybounce/?print=yes 401 comments programming
- NSA BIOS Backdoor a.k.a. God Mode Malware http://resources.infosecinstitute.com/nsa-bios-backdoor-god-mode-malware-deitybounce/?print=yes 18 comments worldnews
- NSA Backdoor Part 2, BULLDOZER: And, Learn How to DIY a NSA Hardware Implant http://resources.infosecinstitute.com/nsa-bios-backdoor-aka-god-mode-malware-part-2-bulldozer/?Print=Yes 6 comments privacy
- NSA BIOS Backdoor a.k.a. God Mode Malware Part 1: DEITYBOUNCE http://resources.infosecinstitute.com/nsa-bios-backdoor-god-mode-malware-deitybounce/?Print=Yes 14 comments privacy
- NSA BIOS Backdoor a.k.a. God Mode Malware Part 1: DEITYBOUNCE http://resources.infosecinstitute.com/nsa-bios-backdoor-god-mode-malware-deitybounce/?print=yes 42 comments technology
- Computer Forensics Hands-On - Learn 12 basic computer forensics techniques http://resources.infosecinstitute.com/computer-forensics-p2-commander/ 16 comments sysadmin
- Understanding DNS Sinkholes - A weapon against malware http://resources.infosecinstitute.com/dns-sinkhole/ 22 comments sysadmin
- Average CISSP Salary - for 2013 http://resources.infosecinstitute.com/average-cissp-salary-2013/ 16 comments sysadmin
- Windows Phone digital forensics http://resources.infosecinstitute.com/windows-phone-digital-forensics/ 10 comments windowsphone
- Machine learning : Naive Bayes Rule for Android Malware Classification Part 1 http://resources.infosecinstitute.com/machine-learning-naive-bayes-rule-for-malware-detection-and-classification/ 3 comments netsec
- Password Auditing on Active Directory Databases http://resources.infosecinstitute.com/password-auditing-on-active-directory-databases/ 3 comments sysadmin
- Death of the braindump – CompTIA implements performance based testing http://resources.infosecinstitute.com/comptia-performance-based-testing/ 51 comments sysadmin
- Using Google Trends to Analyse the Popularity of IT Security Certifications http://resources.infosecinstitute.com/popularity-of-it-security-certifications/ 34 comments sysadmin
- Hacking WolframAlpha http://resources.infosecinstitute.com/hacking-wolframalpha/ 17 comments netsec
- Follow along reversing the German government’s “Bundestrojaner” http://resources.infosecinstitute.com/german-trojan/ 4 comments netsec
- Measuring the Internet - Part I: Distributed nmap http://resources.infosecinstitute.com/measuring-the-internet/ 29 comments netsec
- SQL Injection through HTTP Headers http://resources.infosecinstitute.com/sql-injection-http-headers/ 24 comments netsec
- Mexican Drug Cartels and Cyberspace http://resources.infosecinstitute.com/mexican-cartels-infosec/ 8 comments netsec
- Mexican Drug Cartels and Cyberspace http://resources.infosecinstitute.com/mexican-cartels-infosec/ 5 comments technology
- Cookie-based SQL Injection http://resources.infosecinstitute.com/cookie-based-sql-injection/ 2 comments netsec
- Soft skills needed for an information security career? http://resources.infosecinstitute.com/soft-skills-hiring/ 13 comments netsec
- pcAnywhere Leaked Source Code - An Anonymous Review http://resources.infosecinstitute.com/pcanywhere-leaked-source-code/ 22 comments netsec
- Attacking the Phishers: An Autopsy on Compromised Phishing Websites http://resources.infosecinstitute.com/attacking-the-phishers/ 4 comments netsec
- Creating backdoors using SQL Injection http://resources.infosecinstitute.com/backdoor-sql-injection/ 5 comments netsec
- Using self-modifying code to evade antivirus http://resources.infosecinstitute.com/writing-self-modifying-code-part-3/ 6 comments netsec
- New google hacking technique: Amazon's CloudFront http://resources.infosecinstitute.com/google-hacking-cloudfront/ 3 comments netsec
- Wordpress recon and exploitation http://resources.infosecinstitute.com/hacking-a-wordpress-site/ 20 comments netsec
- VoIP Pen Testing - hacking SIP authentication, etc. http://resources.infosecinstitute.com/voip-pen-testing/ 3 comments netsec
- Understanding SSD issues when Forensic Imaging http://resources.infosecinstitute.com/ssd-forensics/ 7 comments netsec
- VLAN hacking tutorial http://resources.infosecinstitute.com/vlan-hacking/ 8 comments netsec
- Writing self modifying code tutorial http://resources.infosecinstitute.com/writing-self-modifying-code-part-1/ 5 comments netsec
- Eyesight to the Blind – SSL Decryption for Network Monitoring http://resources.infosecinstitute.com/ssl-decryption/ 4 comments netsec
- Val Smith Reveals His Process for Security Research - "We have a 0 disclosure policy" :-) http://resources.infosecinstitute.com/val-smith/ 15 comments netsec
- Stefan Esser Reveals His Process for Security Research http://resources.infosecinstitute.com/stefan-esser/ 4 comments netsec
- The SLAAC Attack - using IPv6 as a weapon against IPv4 http://resources.infosecinstitute.com/slaac-attack-%E2%80%93-0day-windows-network-interception-configuration-vulnerability/ 24 comments netsec
- OWASP Top 10 Tools and Tactics http://resources.infosecinstitute.com/owasp-top-10-tools-and-tactics/ 3 comments netsec