Documents

Get a JAVA capable browser damnit!!!

Text Files                   

New Files
Millenium Hacking (Hacking 2000) - A general HOWTO for hacking with a goal of showing what hacking was like at the end of the millenium.
Hacking Kit version 2.0 Beta - A very detailed and well written guide for hackers. This document is also fairly up to date and includes examples and source code.
Confidence Remains High Issues 1-6 + Summer Issue - An excellent magazine discussing hacking, phone, radio, and more.
Firewall Papers and Performance Issues - This is a small collection of Papers and source concerning firewalls and their performace.
The Design of a Secure Internet Gateway - This paper describes an internet gateway configuration that helps protect the internal network even if an external machine is compromised
Newbie Files
Un!x: A Hacking Tutorial- read this if you haven't read it.
The Ultimate Guide to Hacking and Phreaking- this is good for the newbie's thing is he doesn't go to deep into Phreaking
Newbie Help on Virii- just to get people started off on how virri works and stuph
A Beginners Guide to Hacking Un*x- a txt file designed for the newbie's, if your not a newbie don't read it you'll be wasting time.
Unix Tutorial: Part 1- this is good if your a newbie or a novice, helps out either way
Unix Tutorial: Part 2- same as the one above.
Hacking: The State of Mind- tells what you do to become a hacker.
The Basics of Hacking 1: Intro- just an intro to hacking
The Basics of Hacking 2: DECs- about how to hack DEC systems.
The Basics of Hacking 3: Data- its a txt about basic ways to hack data computers.
The Ethics of Hacking- The basic ethics of hacker the feeling, goals, etc.
Mentors Last Words- I consider this the hackers anthem, its on every hacker sight, and everyone knows what it is if you don't READ IT!
Social Engineering- another approach to hack, without the computer.
#hack FAQ- similar to the 2600 FAQ, its still helpful though
Are you a Hacker?- well are you?
Unix Hacking Commands- a list of commands that might come in handy while hacking
The Neophyte's Guide to Hacking - Another guide for beginning hackers that talks about a wide range of topics
Novice
Security Holes List-Its a pretty big list of holes in different types of systems
COPS and Robbers - This paper discusses a bit of general security and then goes into detail reguarding Unix system misconfigurations, specifically ones that COPS checks for
There Be Dragons - Another Bellovin paper discussing the various attacks made on att.research.com. This paper is also the source for this page's title.
Administration Hacking- this is helpful if you haven't read it, read it
Hacking Servers- A quick approach to hacking servers but its not indepth.
Security Holes- is about how Security holes manifest themselves in (broadly) four ways
Basic Networking- useful gives you an idea of how everything is hooked up and more.
Security and the Un!x Operating System- This is a useful file that gives you new approaches to hack
Cracking 101 (the full set)- A pretty long set of lessons on cracking
+ORC's Cracking Guides (the full set)- Read this one! if your intrested in cracking its better than the others
Excerpts from Various 2600 Articles- its bout 6 different excerpts, the best ones about hacker A and hacker B, if your bored read it.
Miscellaneous Hacking Text- just some more hacking files
LOD/H's Novice's Guide to Hacking- a good file for anyone.
Watching the Watcher Watching You- a txt file telling you to watch your back.
Concerning Hackers Who Break into Computer Systems- its a pretty big file never took the time to read it.
Cryptography FAQ- a FAQ segmented into 10 different parts.
Darkstorm's 160 pg. Archive of Illicit Philes- a list of files Darkstorm thought were good.
Hacking Techniques- gives you different styles or approaches to hack.
Unix for the Moderate
Hacking the IRC - The Definate Guide
Why Cryptography is Harder Than it Looks - an essay by Bruce Schneier describing the many problems unique to developing cryptosystems. It really is more interesting than it sounds.
Foiling the Cracker - A Survey of, and Improvements to, Password Security. Basically a treatise on how to select proper passwords
Advanced
Internet Worm Source Code- it tells you exactly how it works and what it did and more
An Advanced 4.3BSD IPC Tutorial -This paper describes the IPC facilities new to 4.3BSD. It was written by the CSRG as a supplement to the manpages.
Network (In)Security Through IP Packet Filtering - Why packet filtering is a difficult to use and not always a very secure method of securing a network
Linux Stack OverFlows - An HTML page with sample utilities describing stack overruns on Linux
Thinking About Firewalls - A general overview of firewalls, with tips on how to select one to meet your needs.
NFS Tracing - read it is another way to get it
NFS Tricks
An Introduction to TCP/IP- helpful
Improving the Security of You Site by Hacking into it- this is helpful, give actual approaches into hacking.
Technical Hacking: Part One- a file going more indept in the hacking process.
How to gain super-user access via crontab- made for Unix machienes its a hole in the crontab
Unix Security Measures- it about improving security of your Unix system
A Unix Backboor Triggered my a Mail msg- well i have nothing to say.
Government Security Techniques- just some ways that the government secures there systems and how there techniques to penetrate systems.
Hacking TRW-this is definately not written for beginners anyways its how to hack TRW computers.
Professor Falken's Guide to Code Hacking- ya might want to get this if your intrested in learning Codes
Security Problems in the TCP/IP Protocol Suite
How to Setup a Secure Anonymous FTP Site
Packets Found on an Internet - A very interesting paper describing the various attacks, probes, and miscellaneous packets floating past AT&T Bell Labs' net connection.
IP Hijacking - This paper discuesses the art of IP hijacking.
The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption - A great paper release 27 May 1997 by several of the biggest names in encryption and computer security, including Steven Bellovin, Matt Blaze, Whitfield Diffie, and John Gilmore.
Sockets Frequently Asked Questions - Socket Frequently Asked Questions includes many examples and source code.
Getting a Handle on Internet Secuity
Sequence Number Attacks - A brief article that gives an overview of TCP sequence number attacks. (Includes rfc1948 which shows how to protecte against TCP sequence no. attacks.
How to Hack.....
How to hack Telenet- another text file about hacking Telenet
How to get a free account on CompuServe
Misc info on Hacking a System/75- well that sums it up.
Hacking McDonald's Computers- it tells you how to login through telenet and other good stuph
How to hack VAXes- a useful file but its not a usual thing to run into a VAX
Hacking Wal-Mart- tells you how to get passed that phuck Wal-Mart Armorguard
Hacking Cosmos- a file to start you off on hacking Cosmos
Telenet: The Secret Exposed- txt file about hacking Telenet
How to hack into Telegard- self explainatory
Misc.
What to Look for in a Code Hacking Program- I haven't read this one
International Hacking Groups- a list of hacker cliques nationwide
How Mitnick Hacked Tsutomu- exactly what it says.
Text about the Legions of Doom bust- nothing more to say.
Anonymity on the Net- is a lengthy excerpt from arecent issue of FIDONEWS concerning individual privacy and the use of aliases or handles in computer-based communications
Some Interesting text files about a "hacking" case
Info on researching computer crimes- didn't read this one
Info about InterNet dialouts- a list of internet dialouts
Everything you wanted to know about loops- exactly what it says
Hacking Directories #1- a huge list of 800 numbers with modems on the other end.
Hacking Directories #2- a huge list of 800 numbers with modems on the other end.
Hacking Directories #3- a huge list of 800 numbers with modems on the other end.
Hacking Directories #4- a huge list of 800 numbers with modems on the other end.
Loops explained- a txt files explained what loops are and what they do
US LATA Numbers- a list of US telephone LATA Numbers
About government involvement on the net- nothing more to say
The Constitution in CyberSpace- this is pretty good its kind of like the Mentor's Last Words, this thing is hanging on my wall in my room.
Introduction to ANI- is about Automatic Number Indentification this should be under phreaking
Computer Crimes--Laws- Laws that pertain to computer crimes and etc.
Free Speech in CyberSpace- its about how people got in trouble for stupid stuph on the net.
Computer Crime: Practices, Problems, and Solutions- self explainatory
An Introduction to the Computer Underground- explains what underground is and explains the undergrounds forms of media
Computer Privacy vs. 1st and 4th amendment rights- a little debate between the two.
Diary Of A Hacker Part 2- this is good you feel like you wrote this.
Diary of A Hacker- these are really good read them.

Guides to Mostly Harmless Hacking                    

Volume One
gtmhh1-1: Introduction to hacking, description of telnet, and introduction to port surfing
gtmhh1-2: Forging Email 101, and how to spot and track forgeries
gtmhh1-3: Elaboration on finger, and lesson on fingering through telnet
gtmhh1-4: How to fight Usenet spammers
gtmhh1-5: How to fight Email spammers
gtmhh1-6: How to get offensive web pages taken off the Web
Volume Two
gtmhh2-1: Introduction to the Internet and how it works
gtmhh2-2: Introduction to Linux
gtmhh2-3: Explanation of Win95 ping exploit, AKA "killer ping attack" and also just a basic introduction to ping
gtmhh2-4: Elaboration on port surfing, and definition of daemons
Volume Three
gtmhh3-1: How to keep from being Email bombed, and how to recover if you get bombed
gtmhh3-2: How to map the Internet
gtmhh3-3: How to protect yourself on IRC
Law Editions
Number One: Intro
Beginners Series
Issue 1-1: Intro
Issue 2-1: Hacking into Windows 95
Issue 2-2: Hacking into Windows 95 pt. 2
Issue 2-3: Hacking from Windows 3.x, 95 and NT

Rainbow Books                    

Yellow Book- A Guide to Understanding Trusted Recovery
Red Book- Trusted Network Interpretation [Version 1 7/31/87]
Purple Book- Guidelines for Formal Verification Systems [4/1/89]
Luscious Orange- DOD Trusted Computer System Evaluation Criteria [DOD 5200.28]
Green Book- DoD Password Management Guidelines
Dark Lavender- A Guide to Understanding Trusted Distribution in Trusted Systems
Brown Book- A Guide to Understanding Trusted Facility Management [6/89]
Blue Book- Trusted Product Evaluation Questionnaire
Tan Book- A Guide to Understanding Audit in Trusted Systems
Light Blue- A Guide to Understanding Identification and Authentication in Trusted Systems
Peach Book- A Guide to Writing the Security Features User's Guide for Trusted Systems
Pink Book- Rating Maintenance Phase Program Document
Another Red Book- Trusted Network Interpretation Environments Guideline
Another Orange Book- A Guide to Understanding Configuration management in Trusted Systems
Burgendy Book- A Guide to Understanding Design Documentation in Trusted Systems
Grey Book-Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System
Lavender Book- A Guide to Understanding Trusted Distribution in Trusted Systems
Venice Blue-Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria
Aqua Book- Glossary of Computer Security Terms
Bright Blue- Trusted Product Evaluation - A Guide for Vendors
Dark Lavender- Trusted Database Management System Interpretation
Yes Another Orange Book- A Guide to Understanding Discretionary Access Control in Trusted Systems
Book (yes its got no color)- Writing Trusted Facility Manuals

 

Get a JAVA capable browser damnit!!!

| Main Page | Documents | Tools | Crackers,Etc. | Survey |

All rights reserved. Copyright © 1999 FiRe StOrM.
For problems or questions regarding this website contact
[[email protected]].
Last updated: June 17, 1999.