| New Files |
| Millenium Hacking (Hacking 2000) -
A general HOWTO for hacking with a goal of showing what hacking was like at the end of the
millenium. |
| Hacking Kit version 2.0 Beta
- A very detailed and well written guide for hackers. This document is also fairly up to
date and includes examples and source code. |
| Confidence Remains High Issues 1-6 +
Summer Issue - An excellent magazine discussing hacking, phone, radio, and more. |
| Firewall Papers and
Performance Issues - This is a small collection of Papers and source concerning
firewalls and their performace. |
| The Design of a Secure Internet
Gateway - This paper describes an internet gateway configuration that helps protect
the internal network even if an external machine is compromised |
| Newbie Files |
| Un!x: A Hacking Tutorial- read this if you haven't read
it. |
| The Ultimate Guide to Hacking and
Phreaking- this is good for the newbie's thing is he doesn't go to deep into Phreaking |
| Newbie
Help on Virii- just to get people started off on how virri works and stuph |
| A Beginners Guide to Hacking Un*x-
a txt file designed for the newbie's, if your not a newbie don't read it you'll be wasting
time. |
| Unix Tutorial: Part 1- this is
good if your a newbie or a novice, helps out either way |
| Unix Tutorial: Part 2- same as
the one above. |
| Hacking: The State of Mind-
tells what you do to become a hacker. |
| The
Basics of Hacking 1: Intro- just an intro to hacking |
| The Basics of Hacking 2: DECs-
about how to hack DEC systems. |
| The Basics of Hacking 3: Data- its
a txt about basic ways to hack data computers. |
| The Ethics of Hacking- The basic
ethics of hacker the feeling, goals, etc. |
| Mentors Last Words- I consider
this the hackers anthem, its on every hacker sight, and everyone knows what it is if you
don't READ IT! |
| Social Engineering- another
approach to hack, without the computer. |
| #hack
FAQ- similar to the 2600 FAQ, its still helpful though |
| Are you a Hacker?- well are you? |
| Unix
Hacking Commands- a list of commands that might come in handy while hacking |
| The Neophyte's Guide to Hacking
- Another guide for beginning hackers that talks about a wide range of topics |
| Novice |
| Security Holes List-Its a pretty
big list of holes in different types of systems |
| COPS and Robbers - This
paper discusses a bit of general security and then goes into detail reguarding Unix system
misconfigurations, specifically ones that COPS checks for |
| There Be Dragons -
Another Bellovin paper discussing the various attacks made on att.research.com. This paper
is also the source for this page's title. |
| Administration
Hacking- this is helpful if you haven't read it, read it |
| Hacking Servers- A quick approach
to hacking servers but its not indepth. |
| Security
Holes- is about how Security holes manifest themselves in (broadly) four ways |
| Basic Networking- useful gives
you an idea of how everything is hooked up and more. |
| Security
and the Un!x Operating System- This is a useful file that gives you new approaches to
hack |
| Cracking 101 (the full set)- A
pretty long set of lessons on cracking |
| +ORC's Cracking Guides (the full
set)- Read this one! if your intrested in cracking its better than the others |
| Excerpts from Various 2600 Articles-
its bout 6 different excerpts, the best ones about hacker A and hacker B, if your bored
read it. |
| Miscellaneous
Hacking Text- just some more hacking files |
| LOD/H's Novice's Guide to Hacking-
a good file for anyone. |
| Watching the Watcher Watching You-
a txt file telling you to watch your back. |
| Concerning Hackers Who Break into
Computer Systems- its a pretty big file never took the time to read it. |
| Cryptography FAQ- a FAQ
segmented into 10 different parts. |
| Darkstorm's 160 pg. Archive of
Illicit Philes- a list of files Darkstorm thought were good. |
| Hacking Techniques- gives you
different styles or approaches to hack. |
| Unix for the Moderate |
| Hacking the IRC - The Definate Guide |
| Why Cryptography is Harder Than it
Looks - an essay by Bruce Schneier describing the many problems unique to developing
cryptosystems. It really is more interesting than it sounds. |
| Foiling the Cracker - A
Survey of, and Improvements to, Password Security. Basically a treatise on how to select
proper passwords |
| Advanced |
| Internet
Worm Source Code- it tells you exactly how it works and what it did and more |
| An Advanced 4.3BSD IPC
Tutorial -This paper describes the IPC facilities new to 4.3BSD. It was written by the
CSRG as a supplement to the manpages. |
| Network (In)Security
Through IP Packet Filtering - Why packet filtering is a difficult to use and not
always a very secure method of securing a network |
| Linux Stack OverFlows
- An HTML page with sample utilities describing stack overruns on Linux |
| Thinking About Firewalls
- A general overview of firewalls, with tips on how to select one to meet your needs. |
| NFS
Tracing - read it is another way to get it |
| NFS Tricks |
| An
Introduction to TCP/IP- helpful |
| Improving
the Security of You Site by Hacking into it- this is helpful, give actual approaches
into hacking. |
| Technical Hacking: Part One- a
file going more indept in the hacking process. |
| How to gain super-user access via
crontab- made for Unix machienes its a hole in the crontab |
| Unix Security Measures- it about
improving security of your Unix system |
| A
Unix Backboor Triggered my a Mail msg- well i have nothing to say. |
| Government Security Techniques-
just some ways that the government secures there systems and how there techniques to
penetrate systems. |
| Hacking TRW-this is definately
not written for beginners anyways its how to hack TRW computers. |
| Professor Falken's Guide to Code
Hacking- ya might want to get this if your intrested in learning Codes |
| Security Problems in the TCP/IP Protocol Suite |
| How to Setup a Secure Anonymous FTP Site |
| Packets Found on an
Internet - A very interesting paper describing the various attacks, probes, and
miscellaneous packets floating past AT&T Bell Labs' net connection. |
| IP Hijacking - This paper
discuesses the art of IP hijacking. |
| The Risks of Key Recovery, Key
Escrow, and Trusted Third-Party Encryption - A great paper release 27 May 1997 by
several of the biggest names in encryption and computer security, including Steven
Bellovin, Matt Blaze, Whitfield Diffie, and John Gilmore. |
| Sockets Frequently Asked
Questions - Socket Frequently Asked Questions includes many examples and source code. |
| Getting a Handle on Internet Secuity |
| Sequence Number Attacks
- A brief article that gives an overview of TCP sequence number attacks. (Includes rfc1948
which shows how to protecte against TCP sequence no. attacks. |
| How to Hack..... |
| How
to hack Telenet- another text file about hacking Telenet |
| How
to get a free account on CompuServe |
| Misc
info on Hacking a System/75- well that sums it up. |
| Hacking McDonald's Computers- it
tells you how to login through telenet and other good stuph |
| How to hack VAXes- a useful file
but its not a usual thing to run into a VAX |
| Hacking Wal-Mart- tells you how
to get passed that phuck Wal-Mart Armorguard |
| Hacking Cosmos- a file to start
you off on hacking Cosmos |
| Telenet: The Secret Exposed- txt
file about hacking Telenet |
| How to hack into Telegard- self
explainatory |
| Misc. |
| What to Look for in a Code Hacking
Program- I haven't read this one |
| International
Hacking Groups- a list of hacker cliques nationwide |
| How Mitnick Hacked Tsutomu-
exactly what it says. |
| Text about the Legions of Doom bust-
nothing more to say. |
| Anonymity on the Net- is a
lengthy excerpt from arecent issue of FIDONEWS concerning individual privacy and the use
of aliases or handles in computer-based communications |
| Some Interesting text files about a "hacking" case |
| Info
on researching computer crimes- didn't read this one |
| Info about InterNet dialouts- a
list of internet dialouts |
| Everything you wanted to know about
loops- exactly what it says |
| Hacking
Directories #1- a huge list of 800 numbers with modems on the other end. |
| Hacking
Directories #2- a huge list of 800 numbers with modems on the other end. |
| Hacking
Directories #3- a huge list of 800 numbers with modems on the other end. |
| Hacking
Directories #4- a huge list of 800 numbers with modems on the other end. |
| Loops
explained- a txt files explained what loops are and what they do |
| US LATA Numbers- a list of US
telephone LATA Numbers |
| About government involvement on the
net- nothing more to say |
| The Constitution in CyberSpace-
this is pretty good its kind of like the Mentor's Last Words, this thing is hanging on my
wall in my room. |
| Introduction
to ANI- is about Automatic Number Indentification this should be under phreaking |
| Computer Crimes--Laws- Laws that
pertain to computer crimes and etc. |
| Free Speech in CyberSpace- its
about how people got in trouble for stupid stuph on the net. |
| Computer Crime: Practices, Problems,
and Solutions- self explainatory |
| An Introduction to the Computer
Underground- explains what underground is and explains the undergrounds forms of media |
| Computer Privacy vs. 1st and 4th
amendment rights- a little debate between the two. |
| Diary Of A Hacker Part 2- this is
good you feel like you wrote this. |
| Diary of A Hacker- these are
really good read them. |