New Files |
Millenium Hacking (Hacking 2000) -
A general HOWTO for hacking with a goal of showing what hacking was like at the end of the
millenium. |
Hacking Kit version 2.0 Beta
- A very detailed and well written guide for hackers. This document is also fairly up to
date and includes examples and source code. |
Confidence Remains High Issues 1-6 +
Summer Issue - An excellent magazine discussing hacking, phone, radio, and more. |
Firewall Papers and
Performance Issues - This is a small collection of Papers and source concerning
firewalls and their performace. |
The Design of a Secure Internet
Gateway - This paper describes an internet gateway configuration that helps protect
the internal network even if an external machine is compromised |
Newbie Files |
Un!x: A Hacking Tutorial- read this if you haven't read
it. |
The Ultimate Guide to Hacking and
Phreaking- this is good for the newbie's thing is he doesn't go to deep into Phreaking |
Newbie
Help on Virii- just to get people started off on how virri works and stuph |
A Beginners Guide to Hacking Un*x-
a txt file designed for the newbie's, if your not a newbie don't read it you'll be wasting
time. |
Unix Tutorial: Part 1- this is
good if your a newbie or a novice, helps out either way |
Unix Tutorial: Part 2- same as
the one above. |
Hacking: The State of Mind-
tells what you do to become a hacker. |
The
Basics of Hacking 1: Intro- just an intro to hacking |
The Basics of Hacking 2: DECs-
about how to hack DEC systems. |
The Basics of Hacking 3: Data- its
a txt about basic ways to hack data computers. |
The Ethics of Hacking- The basic
ethics of hacker the feeling, goals, etc. |
Mentors Last Words- I consider
this the hackers anthem, its on every hacker sight, and everyone knows what it is if you
don't READ IT! |
Social Engineering- another
approach to hack, without the computer. |
#hack
FAQ- similar to the 2600 FAQ, its still helpful though |
Are you a Hacker?- well are you? |
Unix
Hacking Commands- a list of commands that might come in handy while hacking |
The Neophyte's Guide to Hacking
- Another guide for beginning hackers that talks about a wide range of topics |
Novice |
Security Holes List-Its a pretty
big list of holes in different types of systems |
COPS and Robbers - This
paper discusses a bit of general security and then goes into detail reguarding Unix system
misconfigurations, specifically ones that COPS checks for |
There Be Dragons -
Another Bellovin paper discussing the various attacks made on att.research.com. This paper
is also the source for this page's title. |
Administration
Hacking- this is helpful if you haven't read it, read it |
Hacking Servers- A quick approach
to hacking servers but its not indepth. |
Security
Holes- is about how Security holes manifest themselves in (broadly) four ways |
Basic Networking- useful gives
you an idea of how everything is hooked up and more. |
Security
and the Un!x Operating System- This is a useful file that gives you new approaches to
hack |
Cracking 101 (the full set)- A
pretty long set of lessons on cracking |
+ORC's Cracking Guides (the full
set)- Read this one! if your intrested in cracking its better than the others |
Excerpts from Various 2600 Articles-
its bout 6 different excerpts, the best ones about hacker A and hacker B, if your bored
read it. |
Miscellaneous
Hacking Text- just some more hacking files |
LOD/H's Novice's Guide to Hacking-
a good file for anyone. |
Watching the Watcher Watching You-
a txt file telling you to watch your back. |
Concerning Hackers Who Break into
Computer Systems- its a pretty big file never took the time to read it. |
Cryptography FAQ- a FAQ
segmented into 10 different parts. |
Darkstorm's 160 pg. Archive of
Illicit Philes- a list of files Darkstorm thought were good. |
Hacking Techniques- gives you
different styles or approaches to hack. |
Unix for the Moderate |
Hacking the IRC - The Definate Guide |
Why Cryptography is Harder Than it
Looks - an essay by Bruce Schneier describing the many problems unique to developing
cryptosystems. It really is more interesting than it sounds. |
Foiling the Cracker - A
Survey of, and Improvements to, Password Security. Basically a treatise on how to select
proper passwords |
Advanced |
Internet
Worm Source Code- it tells you exactly how it works and what it did and more |
An Advanced 4.3BSD IPC
Tutorial -This paper describes the IPC facilities new to 4.3BSD. It was written by the
CSRG as a supplement to the manpages. |
Network (In)Security
Through IP Packet Filtering - Why packet filtering is a difficult to use and not
always a very secure method of securing a network |
Linux Stack OverFlows
- An HTML page with sample utilities describing stack overruns on Linux |
Thinking About Firewalls
- A general overview of firewalls, with tips on how to select one to meet your needs. |
NFS
Tracing - read it is another way to get it |
NFS Tricks |
An
Introduction to TCP/IP- helpful |
Improving
the Security of You Site by Hacking into it- this is helpful, give actual approaches
into hacking. |
Technical Hacking: Part One- a
file going more indept in the hacking process. |
How to gain super-user access via
crontab- made for Unix machienes its a hole in the crontab |
Unix Security Measures- it about
improving security of your Unix system |
A
Unix Backboor Triggered my a Mail msg- well i have nothing to say. |
Government Security Techniques-
just some ways that the government secures there systems and how there techniques to
penetrate systems. |
Hacking TRW-this is definately
not written for beginners anyways its how to hack TRW computers. |
Professor Falken's Guide to Code
Hacking- ya might want to get this if your intrested in learning Codes |
Security Problems in the TCP/IP Protocol Suite |
How to Setup a Secure Anonymous FTP Site |
Packets Found on an
Internet - A very interesting paper describing the various attacks, probes, and
miscellaneous packets floating past AT&T Bell Labs' net connection. |
IP Hijacking - This paper
discuesses the art of IP hijacking. |
The Risks of Key Recovery, Key
Escrow, and Trusted Third-Party Encryption - A great paper release 27 May 1997 by
several of the biggest names in encryption and computer security, including Steven
Bellovin, Matt Blaze, Whitfield Diffie, and John Gilmore. |
Sockets Frequently Asked
Questions - Socket Frequently Asked Questions includes many examples and source code. |
Getting a Handle on Internet Secuity |
Sequence Number Attacks
- A brief article that gives an overview of TCP sequence number attacks. (Includes rfc1948
which shows how to protecte against TCP sequence no. attacks. |
How to Hack..... |
How
to hack Telenet- another text file about hacking Telenet |
How
to get a free account on CompuServe |
Misc
info on Hacking a System/75- well that sums it up. |
Hacking McDonald's Computers- it
tells you how to login through telenet and other good stuph |
How to hack VAXes- a useful file
but its not a usual thing to run into a VAX |
Hacking Wal-Mart- tells you how
to get passed that phuck Wal-Mart Armorguard |
Hacking Cosmos- a file to start
you off on hacking Cosmos |
Telenet: The Secret Exposed- txt
file about hacking Telenet |
How to hack into Telegard- self
explainatory |
Misc. |
What to Look for in a Code Hacking
Program- I haven't read this one |
International
Hacking Groups- a list of hacker cliques nationwide |
How Mitnick Hacked Tsutomu-
exactly what it says. |
Text about the Legions of Doom bust-
nothing more to say. |
Anonymity on the Net- is a
lengthy excerpt from arecent issue of FIDONEWS concerning individual privacy and the use
of aliases or handles in computer-based communications |
Some Interesting text files about a "hacking" case |
Info
on researching computer crimes- didn't read this one |
Info about InterNet dialouts- a
list of internet dialouts |
Everything you wanted to know about
loops- exactly what it says |
Hacking
Directories #1- a huge list of 800 numbers with modems on the other end. |
Hacking
Directories #2- a huge list of 800 numbers with modems on the other end. |
Hacking
Directories #3- a huge list of 800 numbers with modems on the other end. |
Hacking
Directories #4- a huge list of 800 numbers with modems on the other end. |
Loops
explained- a txt files explained what loops are and what they do |
US LATA Numbers- a list of US
telephone LATA Numbers |
About government involvement on the
net- nothing more to say |
The Constitution in CyberSpace-
this is pretty good its kind of like the Mentor's Last Words, this thing is hanging on my
wall in my room. |
Introduction
to ANI- is about Automatic Number Indentification this should be under phreaking |
Computer Crimes--Laws- Laws that
pertain to computer crimes and etc. |
Free Speech in CyberSpace- its
about how people got in trouble for stupid stuph on the net. |
Computer Crime: Practices, Problems,
and Solutions- self explainatory |
An Introduction to the Computer
Underground- explains what underground is and explains the undergrounds forms of media |
Computer Privacy vs. 1st and 4th
amendment rights- a little debate between the two. |
Diary Of A Hacker Part 2- this is
good you feel like you wrote this. |
Diary of A Hacker- these are
really good read them. |