Bruce Schneier Sensible Security Model (SSM)
 http://www.win.tue.nl/~wstomv/quotes/beyond-fear.html
Scrum Guide
 http://www.scrumguides.org/scrum-guide.html
MS 1. Identify Assets
 https://msdn.microsoft.com/en-us/library/ff648644.aspx#c03618429_006
OWASP Assets
 https://www.owasp.org/index.php/Application_Threat_Modeling#Assets
MS 2. Create an Architecture Overview
 https://msdn.microsoft.com/en-us/library/ff648644.aspx#c03618429_007
MS 3. Decompose the Application
 https://msdn.microsoft.com/en-us/library/ff648644.aspx#c03618429_008
MS 4. Identify the Threats
 https://msdn.microsoft.com/en-us/library/ff648644.aspx#c03618429_009
OWASP Threat Model Information
 https://www.owasp.org/index.php/Application_Threat_Modeling#Threat_Model_Informati
 on
OWASP External Dependencies
 https://www.owasp.org/index.php/Application_Threat_Modeling#External_Dependencies
OWASP Entry Points
 https://www.owasp.org/index.php/Application_Threat_Modeling#Entry_Points
MS 5. Document the Threats
 https://msdn.microsoft.com/en-us/library/ff648644.aspx#c03618429_010
OWASP Risk Rating Methodology
 https://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology
Intel Threat Agent Library
 https://communities.intel.com/servlet/JiveServlet/previewBody/1151-102-1-1111/Threat%2
 0Agent%20Library_07-2202w.pdf
Based on the MicroSoft 6. Rate the Threats
 https://msdn.microsoft.com/en-us/library/ff648644.aspx#c03618429_011
Exploit Database from Offensive Security
 https://github.com/offensive-security/exploit-database
Web Front-end
 https://www.exploit-db.com/
SecurityFocus BugTraq
 http://www.securityfocus.com/archive/1
Rapid7 (current owner of Metasploit) also has a database
 http://www.rapid7.com/db/modules/search
NodeSecurity
 https://nodesecurity.io/advisories
National Vulnerability Database
 https://web.nvd.nist.gov/view/vuln/search
OWASP Countermeasure Identification
 https://www.owasp.org/index.php/Application_Threat_Modeling#Countermeasure_Identifi
 cation
MS STRIDE provides countermeasures to identified threats
 https://msdn.microsoft.com/en-us/library/ff648641.aspx#c02618429_005
MS Threats and Countermeasures
 https://msdn.microsoft.com/en-us/library/ff648641.aspx
Peter Kim discusses a selection of tools in “The Hacker Playbook” that he uses regularly. I’ve included some of them in this section as they have been found to be very useful.
Kali Linux
 http://docs.kali.org/introduction/what-is-kali-linux
Kali repository
 http://git.kali.org/gitweb/
Turn-key VMware or VirtualBox
 https://www.offensive-security.com/kali-linux-vmware-virtualbox-image-download/ image
Custom ARM images
 https://www.offensive-security.com/kali-linux-vmware-virtualbox-image-download/
NetHunter
 https://www.kali.org/kali-linux-nethunter/
Offensive Security team which can be found on IRC
 http://docs.kali.org/community/kali-linux-irc-channel
Official Kali documentation
 http://docs.kali.org/category/installation
Pre-generated SSH host key, check-out Nilesh Kapoor’s talk at OWASP NZ Day 2016 on Host Hardening
 https://www.owasp.org/index.php/OWASP_New_Zealand_Day_2016#tab=Presentation_Sch
 edule
VMware and VirtualBox images
 https://www.offensive-security.com/kali-linux-vmware-virtualbox-image-download/
ISO can be downloaded from
 https://www.kali.org/downloads/
SHA1 checksums
 http://docs.kali.org/introduction/download-official-kali-linux-images
Downloads
 https://www.kali.org/downloads/
SSH1SUMS and gpg files
 http://archive.kali.org/kali-images/
Extra help with gpg
 http://blog.binarymist.net/2015/01/31/gnupg-key-pair-with-sub-keys/
Hard-disk install
 http://docs.kali.org/installation/kali-linux-hard-disk-install
Install Guest Additions
 http://docs.kali.org/general-use/kali-linux-virtual-box-guest
You will need to add your user
 https://www.virtualbox.org/manual/ch04.html#sf_mount_auto
The Metasploit Community / Pro package is no longer shipping in Kali
 https://www.kali.org/releases/kali-linux-20-released/
Useful metasploit commands
 https://www.offensive-security.com/metasploit-unleashed/msfconsole-commands/
Meterpreter Client
 https://en.wikibooks.org/wiki/Metasploit/MeterpreterClient
Meterpreter Basics
 https://www.offensive-security.com/metasploit-unleashed/meterpreter-basics/
Using databases
 https://www.offensive-security.com/metasploit-unleashed/using-databases/
Information gathering
 http://resources.infosecinstitute.com/information-gathering-using-metasploit/
BeEF recommended configuration
 https://github.com/beefproject/beef/wiki/Configuration
Contrary to a blog post on the beefproject, I’ve found the most useful way to run BeEF
 http://blog.beefproject.com/2014/06/kali-formerly-backtrack-linux-beef.html
BeEF console
 https://github.com/beefproject/beef/wiki/BeEF-Console
Terminator does everything I need from a terminal. Briefly discussed on my blog
 http://blog.binarymist.net/2013/01/19/a-decent-console-for-windows/
Veil Framework
 https://www.veil-framework.com/
Install all of the projects
 https://github.com/Veil-Framework/Veil
Install guides
 https://www.veil-framework.com/guidesvideos/
Rockyou
 http://downloads.skullsecurity.org/passwords/rockyou.txt.bz2
These came available from a social game and advertising website in 2009
 Peter Kims “The Hacker Playbook 2”.
Search for crackstation
 https://crackstation.net/buy-crackstation-wordlist-password-cracking-dictionary.htm
Passwords_WordList_CLEANED
 http://blog.thireus.com/cracking-story-how-i-cracked-over-122-million-sha1-and-md5-hash
 ed-passwords/
SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
RSnakes collection
 https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet
Tamper Data
 https://addons.mozilla.org/en-US/firefox/addon/tamper-data/
Install the particular VirtualBox Extension Pack on to the host:
 https://www.virtualbox.org/ticket/9511?cversion=0&cnum_hist=2
The fact that a WAF is in place is often given away by simply inspecting the responses from the server side
 https://pentestlab.wordpress.com/2013/01/13/detecting-web-application-firewalls/
To view all of the currently available local nmap scripts
 http://cyberpedia.in/nmap-scripting-engine-scanning-in-kali-linux/
NMap has a couple of good scripts out of the box for WAF detection
 http-waf-detect: https://nmap.org/nsedoc/scripts/http-waf-detect.html
 http-waf-fingerprint: https://nmap.org/nsedoc/scripts/http-waf-fingerprint.html
WAFW00F is also an excellent tool
 https://github.com/sandrogauci/wafw00f
nslookup which generally provides less information and uses its own internal libraries as opposed to the OS resolver libraries that dig uses.
 http://unix.stackexchange.com/questions/93808/dig-vs-nslookup
/usr/share/dirbuster/wordlists/directories.jbrofuzz is not great, but it is not bad either
 http://null-byte.wonderhowto.com/how-to/hack-like-pro-abusing-dns-for-reconnaissance-
 0157448/
theHarvester is a tool for gathering e-mail acconts, subdomain names, virtual hosts, open ports/ banners, and employee names from different public sources (search engines, pgp key servers)
 https://github.com/laramies/theHarvester
See issue 30
 https://github.com/laramies/theHarvester/issues/30
recon-ng tracks users by default using google analytics.
 https://bitbucket.org/LaNMaSteR53/recon-ng/commits/eab6307
You can dissable this with the --no-analytics argument
 https://bitbucket.org/LaNMaSteR53/recon-ng/commits/717c7c6
Also discussed in the wiki
 https://bitbucket.org/LaNMaSteR53/recon-ng/wiki/Usage%20Guide#!analytics
API keys for recon-ng
 https://bitbucket.org/LaNMaSteR53/recon-ng/wiki/Usage%20Guide#!acquiring-api-keys
Microsoft bing virtual hosts search feature
 “Penetration Tester’s Open Source Toolkit” book
I also wrote about a few other vulnerability scanners on my blog
 http://blog.binarymist.net/2014/03/29/up-and-running-with-kali-linux-and-friends/
 #vulnerability-scanners
Exploit Database
 https://github.com/offensive-security/exploit-database
Docker used LXC as the default execution environment before the release of version 0.9 on March 13, 2014
 https://en.wikipedia.org/wiki/Docker_(software)
Docker was open sourced in March 2013
 http://www.infoq.com/news/2013/03/Docker
Docker README
 https://github.com/docker/docker
cgroups
 https://en.wikipedia.org/wiki/Cgroups
firejail
Allows a process and all its descendants to have their own private view of the globally shared kernel resources, such as the network stack, process table, mount table.
 https://firejail.wordpress.com/
Linux namespaces
 https://lwn.net/Articles/531114/
The source code is on github
 https://github.com/netblue30/firejail
Pre-built DEB, AUR and RPM packages are available for download
 https://firejail.wordpress.com/download-2/
Firejail can even run LXC, Docker and OpenVZ containers
 https://firejail.wordpress.com/support/frequently-asked-questions/
seccomp-bpf
 https://l3net.wordpress.com/2015/04/13/firejail-seccomp-guide/
Qubes
Technically Qubes is not a Linux distribution, it’s closer to being a Xen distro if anything
 https://www.qubes-os.org/doc/user-faq/#is-qubes-just-another-linux-distribution
USB stacks and drivers are sand-boxed in their own unprivileged VM (currently experimental)
 https://www.qubes-os.org/doc/qubes-architecture/
A storage domain has also been considered
 https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-020-2015.txt#L97
It provides proper GUI-level (one of the main goals) isolation
 http://theinvisiblethings.blogspot.it/2012/09/how-is-qubes-os-different-from.html
Along with security as one of the primary goals of the GUI virtualisation subsystem, performance was also priority so the virtualised applications feel as if they were executed natively
 https://www.qubes-os.org/doc/user-faq/#is-qubes-just-another-linux-distribution
Based on monolithic kernels usually containing tens of millions of lines of code. Most of this code is reachable from untrusted applications via all sorts of APIs, making the attack surface on the kernel huge.
 http://theinvisiblethings.blogspot.it/2012/09/how-is-qubes-os-different-from.html
Support for Windows 8+ is in development
 https://www.qubes-os.org/doc/windows-appvms/
Excellent tools for this task. There are also many others. Many of which are included in Kali Linux
 http://tools.kali.org/reporting-tools
Dradis is included in Kali Linux and the source code can be accessed from the dradisframework repository
 https://github.com/dradis/dradisframework
There is a collection of security tools that Dradis integrates with
 https://github.com/dradis/dradisframework#some-of-the-features
If you look at the public statistics on businesses loosing value due to being compromised regularly, the figures are staggering
 http://www.meetup.com/OWASP-New-Zealand-Chapter-Christchurch/events/223462991/ 
I have already discussed the test condition workshop many times on-line
 http://blog.binarymist.net/2012/03/24/how-to-optimise-your-testing-effort/#planningTheTes
 tEffort
Cost of Change curve adapted from Scott W. Ambler’s article on Examining the Agile Cost of Change Curve, which I’ve used in many presentations and workshops.
 http://www.agilemodeling.com/essays/costOfChange.htm
NodeGoat The purposly vulnerable NodeJS web application
 https://github.com/OWASP/NodeGoat
OWASP ZAP (which also comes pre-installed on Kali Linux) is a particularly useful tool for security regression testing.
 https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
Node.JS (by way of zaproxy)
 https://www.npmjs.com/package/zaproxy
ZapPenTester write-up on codeproject
 http://www.codeproject.com/Articles/708129/Automated-penetration-testing-in-the-Micros
 oft-sta
The source
 https://github.com/gustavorhm/ZapPenTester
There is also the Zap supported zap-api-dotnet
 https://github.com/zaproxy/zap-api-dotnet
BSIMM again has some good guidance
 https://www.bsimm.com/framework/deployment/penetration-testing/
DOMXSSScanner
 https://github.com/yaph/domxssscanner
JSPrime
 https://www.youtube.com/watch?v=Vk5SPGpqiLc
JSWebTools
 http://www.jswebtools.org/
Code Climate is a static analysis platform
 https://codeclimate.com/
 that provides an open and extensible model to run community provided analysis engines
 https://codeclimate.com/engines
Flow looks to be a good option. Providing consumers with the ability of introducing type checking progressively
 http://flowtype.org/
DBC
 http://blog.binarymist.net/2010/10/11/lsp-dbc-and-nets-support/
Example from the flow website
 http://flowtype.org/
contract-js NPM module
 https://www.npmjs.com/package/contracts-js
contract.js home
 http://www.contractsjs.org/
contractual NPM module
 https://www.npmjs.com/package/contractual
restretto-js
 https://code.google.com/archive/p/ristretto-js/wikis
Essentials for Creating and Maintaining a High Performance Development Team
 http://blog.binarymist.net/2014/01/25/essentials-for-creating-and-maintaining-a-high-performance-development-team/
I really liked what Moxie Marlinspike said on the topic of career advice
 http://www.thoughtcrime.org/blog/career-advice/
There are competitions devoted to reassembling shredded printed documents with contestants that have successfully reassembled all printed matter:
 http://archive.darpa.mil/shredderchallenge/
Not all paper shredders are created equal. Understand the pros and cons:
 https://en.wikipedia.org/wiki/Paper_shredder
Readers and cloners
 http://hackerwarehouse.com/product/proxmark3-kit/
Tessel and its RFID module
 https://tessel.io/modules#module-rfid
Lan Turtle
 http://hakshop.myshopify.com/products/lan-turtle
Remove or degausse MFD hard drives before the device leaves premise at end of life / lease
 http://blog.binarymist.net/2013/03/17/erasing-data-from-your-drives/
Detection works where prevention fails and detection is of no use without response.
 Beyond Fear by Bruce Schneier
People can be your strongest or your weakest defence. This is your choice. Cultural change can be implemented from any level. The most successfully being from the shop floor
 http://blog.binarymist.net/2014/04/26/culture-in-the-work-place/
You will also need to think about company culture and whether this needs some works
 http://blog.binarymist.net/2014/04/26/culture-in-the-work-place/
The speed benefits of Li-Fi are also compelling, many times faster than current Wi-Fi speeds.
 http://www.sciencealer.com/li-fi-tested-in-the-real-world-for-the-first-time-is-100-times-fa
 ster-than-wi-fi
Content Michael Bazzell has collated and his excellent books on the gathering of Open Source Intelligence
 https://inteltechniques.com/links.html
The Arxan 5th Annual State of Application Security Report
 https://www.arxan.com/resources/state-of-application-security/ Perception vs. Reality
The content Michael Bazzell has collated
 https://inteltechniques.com/links.html and his excellent books on the gathering of Open Source Intelligence.
Studies show that motivation has a larger effect on productivity and quality than any other factor. Software Engineering Economics by Barry W. Boehm 1981.
Increase software developer productivity on my blog
 http://blog.binarymist.net/2013/03/02/how-to-increase-software-developer-productivity/
Those distracted by incoming email and phone calls saw a 10-point fall in their IQ by BBC:
 http://news.bbc.co.uk/2/hi/uk_news/4471607.stm
Gerald Weinberg’s rule that 20% of our time is lost every time we perform a context switch. This is from “Quality Software Management: Systems Thinking” by Gerald Weinberg.
Who’s your Daddy (WyD) Another password profiling tool that “extracts words/strings from supplied files and directories. It parses files according to the file-types and extracts the useful information, e.g. song titles, authors and so on from mp3’s or descriptions and titles from images.” “It supports the following filetypes: plain, html, php, doc, ppt, mp3, pdf, jpeg, odp/ods/odp and extracting raw strings.” http://www.remote-exploit.org/articles/misc_research__amp_code/index.html
“CeWL is a ruby app which spiders a given url to a specified depth, optionally following external links, and returns a list of words which can then be used for password crackers” https://digi.ninja/projects/cewl.php
Wordhound
 https://bitbucket.org/mattinfosec/wordhound.git
Hydra has many other options. Plenty of good documentation out there.
 http://null-byte.wonderhowto.com/how-to/hack-like-pro-crack-online-web-form-passwords-with-thc-hydra-burp-suite-0160643/
Hydra seems like the most mature of the brute force specific tools
 https://www.thc.org/thc-hydra/network_password_cracker_comparison.html
Keep the Attack type: “Sniper” because we are only using one wordlist
 https://portswigger.net/burp/help/intruder_positions.html
Keep the Payload set to 1 and Payload type set to Simple list
 https://portswigger.net/burp/help/intruder_payloads_types.html
NMap http-form-brute
 https://nmap.org/nsedoc/scripts/http-form-brute.html
A few changes to this script which may have fixed it
 http://seclists.org/nmap-dev/2014/q3/479
You can DIY with the likes of Asterisk
 http://www.social-engineer.org/wiki/archives/CallerIDspoofing/CallerID-SpoofingWithAste
 risk.html
The government that imprisoned Kevin Mitnick for nearly five years, later sought his advice about how to keep its own networks safe from intruders
 http://www.politechbot.com/p-00969.html 
Open source framework providing all the tools anyone would need to spoof caller Ids and much more
 http://www.social-engineer.org/wiki/archives/CallerIDspoofing/CallerID-SpoofingWithAste
 risk.html
Some services can not handle return messages though, unless the attacker has physical access to a phone that would contact the targets phone (as with flexispy)
 http://blog.flexispy.com/spoof-sms-powerful-secret-weapon-shouldve-using/
SMS spoofing was removed from the social engineering toolkit in version 6.0 due to lack of maintenance
 https://github.com/trustedsec/social-engineer-toolkit/blob/master/readme/CHANGES#L285
Episode 5 of Mr Robot
 http://www.usanetwork.com/mrrobot/episode-guide/season-1-episode-5-eps143xpl0itswmv
 Elliot was making his way through the so called impenetrable storage facility (Steel Mountain) to plant a Raspberry Pi on the network
His colleagues diverted the manager that was escorting him out of the building by sending her a spoofed SMS message
 http://null-byte.wonderhowto.com/how-to/hacks-mr-robot-send-spoofed-sms-text-message-0163331/
SMiShing attacks are on the rise
 http://www.pcworld.com/article/254979/smishing_attacks_are_on_the_rise.html
The following attack was one of five that I demonstrated at WDCNZ in 2015. There was an attack leading up to this one
 https://www.youtube.com/watch?v=tb4o5UCHzSA
Also noted in the Arxan report that 80% of consumers would change providers if they knew about the vulnerabilities and had a better option. 90% of the app execs (the creators) also believed that consumers would switch if they knew and better offerings were available.
 https://www.arxan.com/wp-content/uploads/2016/01/State_of_Application_Security_2016_Consolidated_Report.pdf
What you need to do is be aware of how much productivity is killed with each switch. Then do everything in your power to make sure your Development Team is sheltered from as much as possible. How to Increase Software Developer Productivity by Kim Carter.
The Multi-Tasking Myth by Jeff Atwood:
 http://blog.codinghorror.com/the-multi-tasking-myth/
The trick here is that when you manage programmers, specifically, task switches take a really, really, really long time. Human Task Switches Considered Harmful.
Get yourself a OneRNG for generating true randomness
 http://onerng.info/
MembershipReboot also raises events via an event bus architecture that your application can listen to and take further action on
 https://brockallen.com/2014/02/10/how-membershipreboot-mitigates-login-and-two-factor-
 authentication-brute-force-attacks/
Michael Bazzell has an excellent collection of tools to assist with validating phone numbers under the “Telephone Numbers” heading at his website
 https://inteltechniques.com/links.html
Michael also has a simple tool under the “Telephone Number” heading on the left
 https://inteltechniques.com/intel/menu.html
 which leverage’s a collection of phone number search API’s.
Services such that
automate the above training techniques
A tool such as Pond can help you automate the entire testing process.
 https://bitbucket.org/t0x0/pond
 Chris Campbell (creator of Pond) can be found at:
 https://twitter.com/t0x0_nz
Retrospective is a good time and place to raise the awareness and make sure change occurs
 http://blog.binarymist.net/2012/07/28/guidance-on-running-scrum-retrospectives/ 
Should Pond be used to facilitate the testing, then hosting of the application will incur Windows licensing costs.
 https://bitbucket.org/t0x0/pond