You can refer to some of the articles in Ethical hacking section