General Information
Last Updated: 7/6/2013 11:14:49 PM

Better a bottle in front of me than a frontal lobotomy.



General Hacking Concepts

1008-35.htm
12492 bytes. by Florian Zumbiehl (2010)
Collisions in PDF signatures

upms.txt
2673 bytes.
Ultimate Pandora Memory Stick

ubcode.txt
2694 bytes. by tek (2007)
Removing Useless Code from Universal Binaries

stuff.txt
24161 bytes. (2007)
Someone's hacking stuff

ics.txt
79656 bytes. by ad (2007)
Internet Cafe In/Security
Hacking  
enfirew.txt
3703 bytes. by ISN (2006)
The enemy within the firewall

lojcklap.pdf
270295 bytes. by J. Oquendo (2006)
Hacking Lojack for Laptops
Hacking  
shimomur.txt
18366 bytes. by Tsutomu Shimomura (1995)
How Kevin Mitnick hacked Tsutomu Shimomura
Hacking  
sb6042.htm
13812 bytes. (2003)
Log corruption via specially crafted reverse DNS data

hack5286.htm
40674 bytes. by F. Raynal (2002)
Automated remote format bug exploit whitepaper
Essay   Hacking  
hack5355.htm
16275 bytes. (2002)
Cross Site Scripting white paper
Essay   Hacking  
hack5288.htm
24101 bytes. (2002)
TCP/IP remote timing to learn secret info whitepaper
Essay   Hacking  
hack5309.htm
20965 bytes. (2002)
Protected stack discussion and exploit
Exploit  
how2hak1.txt
76085 bytes. (2002)
How to Hack - Information for Newbies 1/2
Hacking  
how2hak2.txt
28481 bytes. (2002)
How to Hack - Information for Newbies 2/2
Hacking  
hacking.pdf
48689 bytes. (2002)
Common Hacking Tools
Essay   Hacking  
infovld.txt
16975 bytes. (2002)
Information Overload for Newbies
Hacking  
stephack.txt
4639 bytes. (2002)
Steps to Become a Hacker
Hacking  
mids.pdf
39943 bytes. (2002)
Technology Brief: Monitored Intrusion Detection Systems

defnsind.pdf
133324 bytes. by NSA (2001)
Defense in Depth
Internet  
A practical strategy for achieving Information Assurance in today's highly networked environments.
hgc.txt
18390 bytes. by Van Hauser (2001)
Hackers Go Corporate
Hacking  
terrorhk.txt
1812 bytes. (2001)
Terrorism and the Hacker
Hacking  
fd.htm
5819 bytes. (2001)
Can we afford full disclosure of security holes?
Hacking  
nids.htm
174920 bytes.
Network Intrusion Detection Systems
Frequently Asked Questions  
computer.pdf
922962 bytes. by State of New Jersey (2000)
Computer Crime: A Joint Report

06-00.pdf
124429 bytes. (2000)
Mitigating Emerging Hacker Threats

mstrk931.txt
6541 bytes. (2000)
Stupid MS-DOS Tricks #931
MS-DOS   PC System Hacking  
berferd.pdf
38883 bytes. (1991)
An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied
Hacking  
hitchhak.htm
6251 bytes. (2003)
Hitch-Hacking
Hacking  
hb2k.pdf
284199 bytes. (2000)
Hacker Bibel (in German)
In German  
hacksecr.pdf
504120 bytes. (2001)
Hackers' Secrets
Hacking  
bufo.txt
28617 bytes. (2002)
Introduction to Buffer Overflows
Hacking  
wardil.txt
3422 bytes. (2002)
Phone lines, Wardialing, Laptops and the like
Phreaking   Hacking  
formats.txt
15061 bytes. (2002)
Format String Exploitation
Hacking  
in200106.htm
3926 bytes. (2001)
Verification of Downloaded Software
Hacking  
hacknum.txt
12735 bytes. (2002)
Hacking by Numbers
Hacking  
chickun.txt
5236 bytes. (2002)
Authentication Protocols and Their Weaknesses
Hacking  
ras.txt
4803 bytes. (2002)
Remote Access and Security
Hacking  
snortan.txt
6518 bytes. (2002)
Nessus Attack Analysis using Snort
Hacking  
sb5867.htm
17024 bytes. (2002)
Directory Traversal Vulnerabilities in FTP Clients

sb5886.htm
10953 bytes. (2002)
Directory traversal vulnerabilities in several archivers

fprint.htm
47293 bytes. by Fobic (2001)
Examining Advanced Remote OS Detection Methods/Concepts using Perl HAC:

fngprint.htm
39201 bytes. by J. Nazario (2001)
Passive System Fingerprinting using Network Client Applications HAC:

beginstp.txt
48489 bytes. by phantom
Intro: Hacking Step by Step
Hacking  
neophyte.txt
173140 bytes. by Deicide (1993)
The Neophyte's Guide to Hacking
Hacking  
crackers.htm
40912 bytes. (1998)
Techniques Adopted by "System Crackers" HAC:

abstract.txt
106123 bytes. (1990)
Abstracts of hundreds of books and papers on Hacking and Computer Crime

exeguide.txt
23105 bytes. by NIST
Executive Guide to the Protection of Information Resources

itsec.txt
65105 bytes. by Interpol (2001)
Interpol document: IT Security and Crime Prevention Methods
Crayola Book  
private.txt
7329 bytes. by Interpol (2001)
Interpol document: Private Checklist - advice for private use of computers
Crayola Book  
company.txt
31528 bytes. by Interpol (2001)
Interpol document: Company Checklist
Crayola Book  
intitfaq.txt
7216 bytes. by Interpol (2001)
Interpol document: Frequently Asked Questions about Information Security and Crime Prevention
Crayola Book   Frequently Asked Questions  
mhd.txt
593185 bytes. by Rhino9 (1998)
The Modern Hacker's Desk Reference
Hacking  
9x_style.txt
5842 bytes.
LocalHacking vs. NetHacking by GrampaElite

acroynym.txt
30296 bytes.
The IIRG Hackers' Acronym Chart

altsecfq.txt
52491 bytes.
FAQ on Security

auditool.txt
12681 bytes.
Intrusion Detection in Computers

externin.pdf
20679 bytes. (2002)
Dealing with External Computer Security Incidents
Hacking  
al200003.txt
5370 bytes. (2000)
AusCERT Alert 2000.03 Current Widespread Intruder Activity
Advisory   Hacking  
ca200120.txt
9779 bytes. by CERT (2001)
Continuing threats to home users
Advisory  
ca200109.txt
38673 bytes. by CERT (2001)
Statistical Weaknesses in TCP/IP Initial Sequence Numbers
Advisory   Hacking   Internet  
coordat.txt
17735 bytes. (1998)
Coordinated Attacks and Probes
Hacking  
stealth.htm
52679 bytes. (1999)
Stealth Coordinated Attacks
Hacking  
formatbg.txt
5997 bytes. by Lamagra (2001)
Format Bugs
Hacking  
whatu.txt
3562 bytes. by Neon-Lenz (2000)
What you need to: Spoof/Hijack/Predict
Hacking   Internet  
paratran.txt
10257 bytes. by Mixter (2000)
Paranoia vs. Transparency and their effects on Internet Security
Hacking  
xploit.txt
5856 bytes. by ign0re (2000)
Xploits (in German)
Hacking   In German   Internet  
bufitos.pdf
24001 bytes. (2000)
Compromised Buffer Overflows, from Intel to Sparc version 8
Hacking  
advanced.txt
65682 bytes. by T. Oh (2000)
Advanced Buffer Overflow Exploit
Exploit  
exploit.txt
21906 bytes. by Mixter (2000)
Writing Buffer Overflow Exploits - A Tutorial for beginners
Hacking  
digitalv.doc
691712 bytes. by Kurruppt2k (1999)
Digital Voodoo - The Craft of Hacking on the Internet
Hacking   Internet  
w00w00.txt
43055 bytes. by M. Conover (1999)
w00w00 on Heap Overflows
Hacking  
ihg.txt
183099 bytes. by Schultz, Brown, Longstaff (1990)
CIAC Incident Handling Guidelines
Hacking  
esnet2.txt
51297 bytes. by Caruso, Bemis (1989)
ESNet/Decnet Security Policy
Hacking  
bufovf.txt
7024 bytes. by Jus (2000)
Principles of Buffer Overflow explained
Hacking  
protmem.txt
8722 bytes. by Wyze1 (1999)
Protecting Memory and Addressing Part One
Hacking  
protmem2.txt
9844 bytes. by Wyze1 (1999)
Memory and Addressing Protection Part Two
Hacking  
passive.txt
7757 bytes. (2000)
Passive Fingerprinting (of target systems)
Hacking  
get_pass.txt
3783 bytes. (1999)
How to get your friend/enemy's ISP Password
Hacking   Social Engineering  
riskshak.txt
5134 bytes.
Advice on how not to get caught hacking
Hacking  
bump.txt
8300 bytes. (2000)
Things that go Bump on the net

This is a brief look at some of the more colorful characters in the menagerie of network security threats, with an emphasis on how they relate to agent-based sytems.
9004.txt
2392 bytes. (1990)
Computer system "welcome" banners
Hacking  
dialback.txt
10116 bytes. (1985)
Dial back isn't always secure
Hacking   Secrets  
altsefaq.txt
52491 bytes. (1993)
FAQ on Security
Hacking   Frequently Asked Questions  
9007.txt
2909 bytes. (1990)
Fed info proc. standards available online
Hacking  
hackg101.txt
3296 bytes.
Hacking 101 (Hacking, Telenet, Life)
Hacking  
taco1.txt
1524 bytes.
Hacking Taco Bell
Hacking  
techniq.txt
9900 bytes. (1985)
Hacking techniques - from "Out Of The Inner Circle"
Hacking  
schoolhx.txt
29794 bytes. (1999)
How to Hax0r Your School!
Hacking  
where your system's holes are. Perfect for use on the "other" end........heh heh heh......
phrktut.txt
8365 bytes.
How to be a cautious hacker
Hacking  
9005.txt
9565 bytes. (1990)
Internet intruder warning
Hacking  
lazyadmn.txt
3314 bytes. (1999)
Lazy Admins and Free Accounts
Hacking  
lou_guid.txt
27952 bytes.
Legions of the Underground Hacking Guide
Hacking  
lesson.txt
2198 bytes.
Newbie Hackers Lesson 1
Hacking  
9006.txt
2573 bytes. (1990)
Precautionary note
Hacking  
9003.txt
4108 bytes. (1990)
Security violation reporting
Hacking  
technich.txt
8762 bytes.
Technical Hacking
Hacking  
hackgov.txt
5714 bytes.
The Definitive Guide to Hacking the Government
Hacking  
thehgod.txt
9695 bytes. (1996)
The God of H Hacking
Hacking  
9104.txt
5655 bytes. (1991)
Unauthorized Pwd Chg Requests Via Mail Msgs
Hacking  
paranoid.txt
6063 bytes. (1999)
Why it's good to be paranoid
Hacking  
cracker.txt
37658 bytes. (1998)
Techniques Adopted By 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private
Hacking  
Networks Network Security Solutions Ltd. This white paper was written to help give systems administrators and network operations staff an insight into the tactics and methodologies adopted by typical system crackers when targeting large networks.
hackkit.txt
537102 bytes. (1997)
Hacking Kit version 2.0 Beta - Invisible Evil - A very detailed and well written guide for hackers. This
Hacking  
document is also fairly up to date and includes examples and source code.

Hacking Compendia

hackfaq.txt
273775 bytes. (1999)
The Hack FAQ
Hacking   Frequently Asked Questions  
ahm1.txt
15080 bytes. (1999)
alt.hackers.malicious FAQ 1/3
Hacking   Frequently Asked Questions  
ahm2.txt
4077 bytes. (1999)
alt.hackers.malicious FAQ 2/3
Hacking   Frequently Asked Questions  
ahm3.txt
63361 bytes. (1999)
alt.hackers.malicious FAQ 3/3
Hacking   Frequently Asked Questions  
rhackfaq.txt
34289 bytes. (1994)
Risks Forum 1994 Hacking FAQ
Hacking   Frequently Asked Questions  
chapter6.txt
39658 bytes.
The Psychotics' Hacking FAQ
Hacking   Frequently Asked Questions  

Discussions

hackersc.txt
58045 bytes. (1990)
Are Computer Hackers criminals?
Hacking  
mongel.txt
1792 bytes.
Old Hack messages from P-80
Hacking  
oldmsgs2.txt
7174 bytes. (1983)
Proving Grounds BBS phreak/hack messages
Phreaking   Hacking  
oldmsgs1.txt
16806 bytes. (1986)
The Pipeline: Phreak/Hack Messages
Phreaking   Hacking  
oldmsgs3.txt
1251 bytes. (1987)
The Pipeline: Phreak/Hack messages
Phreaking   Hacking  
tequila3.txt
16293 bytes. (1989)
Wow! MORE Hacking OldMsgs (We believe from Tequila Willy's)
Hacking  
sp000267.txt
36238 bytes.
Anarchist discussion on Hacking
Hacking  
apples.txt
8960 bytes.
Sherwood Forest /// - An Apple ][ Warez board - selected messages

compheap.txt
22918 bytes. (1987)
Hacking messages from the Compost Heap BBS
Hacking  
hackshak.txt
19958 bytes.
Hacking messages from Hack Shack BBS (1980s)
Hacking  
pcphack.txt
6272 bytes.
A BBS Message thread on PC Pursuit hackers

phreaks.txt
5946 bytes.
Thread from a phreak BBS (1980s)

circlems.txt
11747 bytes.
Inner Circle Messages

veritas.htm
1377 bytes. by A. Saastamoinen (2001)
BackupExec - any connect to port 8192 will hang
Advisory   Multi Platform  
rsystem1.htm
797 bytes. by G. Cohen (1998)
Systems running RS G2 Cleartext Passwords
Advisory   Multi Platform  

Truly Miscellaneous Hacking Info

epop.htm
1586 bytes. by Chaos 255 (1999)
WiredRed e/pop 2.0.3.125 no security out of the box
Advisory  
navfin25.htm
2491 bytes. by P. Grundl (2001)
Navision Financials Server v2.50, 2.60 Buffer Overflow
Advisory   Internet  
ciack001.htm
35365 bytes. (1999)
Four Vulnerabilities in the Common Desktop Environment
Advisory   Hacking  
seos.htm
3606 bytes. by S. Venkat (2000)
SeOS Insecurity
Advisory  
bt1002.txt
10907 bytes. (2003)
Stack Overflow by SIMPLESEM's abstraction
Hacking  
cokedbug.txt
5402 bytes. (2003)
Coke Machine Debug Menu
Cheating Machines   Hacking  
chgrades.txt
2602 bytes. (2003)
Changing Your Grades For Fun And Profit
Hacking  
bt1136.txt
5226 bytes. (2003)
Multiple IBM DB2 Stack Overflow Vulnerabilities
Multi Platform   Exploit  
bt771.txt
8147 bytes. (2003)
Vulnerability analysis site
Hacking  
intof.txt
25556 bytes. (2003)
Integer Array Overflows
Hacking  
crax0r.pdf
198862 bytes. (2003)
White paper on Crax0r, automatic hacking program.
Hacking  
hackinov.zip
93196 bytes. (1998)
OVERLORD "STEP BY STEP" HACKING GUIDE, v.1.2
Hacking  
real-wrl.pdf
114197 bytes. by B. Schneier (1999)
Security in the Real World: How to Evaluate Security Technology
Hacking  
etherpsc.pdf
7651 bytes. (2003)
EtherPeek and Security
Hacking  
cadefun.txt
9820 bytes. (2003)
Arcade Fun
Cheating Machines  
creatcrd.txt
1446 bytes. (2003)
Exploiting Create-A-Card
Hacking  
intovf.txt
8233 bytes. by M. Howard (2003)
Integer Manipulation Attacks
Hacking  
bt862.txt
9871 bytes. (2003)
Lotus Sametime 3.0 == vulnerable. Lotus lied.
Hacking  
hirelink.txt
8649 bytes. (2003)
Hacking Hirelink
Hacking  
cokedebg.txt
2253 bytes. (2003)
Coke and Ice Cream Machines Debug Menus
Cheating Machines  
sectags.txt
5878 bytes. (2003)
Wal-Mart's Security Tags
Hacking  
armguard.txt
3878 bytes. by KwAnTAM_PoZeEtrON (2003)
Hacking the Wal-Mart Armorguard Computer Protection System
Hacking  
bt1983.txt
7950 bytes. (2003)
SAP DB priv. escalation/remote code execution
Multi Platform  
bt1985.txt
12517 bytes. (2003)
SAP DB web-tools multiple issues
Multi Platform  
hacklex.htm
851032 bytes. by R. Graham (2001)
Hacking Lexicon
Hacking  
scantron.txt
2764 bytes. (1995)
Agent Blue's known Scantron hacks
Hacking  
ciaca3.txt
12807 bytes. (1989)
CIAC # A03 Tools available to check the spread of the "Wank" Worm
Hacking  
comsecfq.txt
12360 bytes. (1994)
Computer Security/Compromise FAQ
Hacking  
snooping.txt
3019 bytes. by Lee Day
Data Snooping: The Right Way
Hacking  
ddn01.txt
2950 bytes. (1989)
Defense Data Network Security Bulletin #1
Hacking  
ddn03.txt
11010 bytes. (1989)
Defense Data Network Security Bulletin #3
Hacking  
ddn04.txt
3066 bytes. (1989)
Defense Data Network Security Bulletin #4
Hacking  
ddn05.txt
4099 bytes. (1989)
Defense Data Network Security Bulletin #5
Hacking  
ddn06.txt
2939 bytes. (1989)
Defense Data Network Security Bulletin #6
Hacking  
ddn9001.txt
4020 bytes. (1990)
Defense Data Network Security Bulletin 90-01
Hacking  
ena1.txt
7860 bytes. (1985)
Explanation of ENA
Hacking  
requestg.txt
4417 bytes.
Get your own, personal FSF account
Hacking  
hack1.txt
10600 bytes.
Hack and Phreak File #1 by The Hyaena (1984?)
Hacking  
hack2.txt
11227 bytes.
Hack and Phreak File #2 by The Hyaena (1984?)
Hacking  
hack3.txt
10325 bytes.
Hack and Phreak File #3 by The Hyaena (1984?)
Hacking  
goodkids.txt
4389 bytes.
Hackers are nice people...
Hacking  
hackin2.txt
4758 bytes.
Hacking Notes 2
Hacking  
hackin.txt
2807 bytes.
Hacking Notes
Hacking  
shiva.txt
29749 bytes. (1999)
Hacking the Shiva-LAN-Rover System
Hacking  
breaksch.txt
6509 bytes.
How to break your school security
Hacking   Linux   Windows  
phucksch.txt
2166 bytes. (1998)
How to phuck around at school
Hacking   Pranks  
assolink.txt
11583 bytes. (1990)
Maine Business AssoLink System
Hacking  
nasahack.txt
5648 bytes. (1987)
The NASA Hackers
Hacking  
guideh.txt
9485 bytes.
The only true guide for learning how to hack, by R4di4tion
Hacking  
netserve.txt
36651 bytes.
US Robotics NetServer/8 Hacking
Hacking  
ciaca11.txt
1881 bytes. (1990)
Problem in the Texas Instruments D3 Control System (RSX)
Hacking  
ciacf020.txt
21325 bytes. (1995)
Satan
Hacking  
ciacf022.txt
9610 bytes. (1995)
Satan Password
Hacking  
ciacj019.txt
14708 bytes. (1999)
Intelligent Peripherals Security Risk
Hacking  
ciacj043.txt
31881 bytes. (1999)
Creating Login Banners
Hacking  
venema.txt
29626 bytes.
Murphy's Law and Computer Security by Weitse Venema

becomehk.txt
29686 bytes.
How to Become a Hacker by Eric S. Raymond

bh.txt
8763 bytes. by Bemis, Hyman (1990)
Terminal Servers and Network Security
Hacking  
adb.txt
1762 bytes. by Wyzewun (1999)
Hacking an Access Database
Hacking   Local: South Africa  
nedbank.txt
1439 bytes. by Gevil (1999)
How to Hack Nedbank
Hacking   Local: South Africa  
nedroot.txt
2171 bytes. by Wyzewun (1999)
How to get a root shell on NedBank
Hacking   Local: South Africa  
sbhack.txt
2560 bytes. by Wyze1 (1999)
Hacking Standard Bank
Hacking   Local: South Africa  
cyberxp.txt
935 bytes. by Wizdumb (2001)
Hacking the CyberXpress Internet Kiosk
Hacking   Internet  
hackswev.txt
8871 bytes. by Olmec (2001)
Hacking in Switched Environments
Hacking   Local Area Networks  
cyberx2.txt
3231 bytes. by plunk3tt (2001)
More fun with CyberXpress Internet Kiosks
Hacking   Internet  
nedbank3.txt
1176 bytes. by Wizdumb (2001)
More fun with Nedbank's Nedassist Terminals
Hacking   Local: South Africa  
ahmfaq-1.txt
16777 bytes. by A. Vig (2001)
alt.hackers.malicious FAQ 1/3
Hacking   Frequently Asked Questions  
ahmfaq-2.txt
10861 bytes. by A. Vig (2001)
alt.hackers.malicious FAQ 2/3
Hacking   Frequently Asked Questions  
ahmfaq-3.txt
65596 bytes. by A. Vig (2001)
alt.hackers.malicious FAQ 3/3
Hacking   Frequently Asked Questions  
overload.txt
16089 bytes. by Harlequin (2001)
Information Overload for Newbies
Hacking   Frequently Asked Questions  
backdoor.c
179 bytes.
A backdoor in 3 lines of code! C source

basichac.txt
8448 bytes.
Basics of Hacking

captainz.txt
9318 bytes.
WHo is Captain Zap?

carcodes.txt
3447 bytes.
Hacking GM cars' onboard computer

cert_m_1.txt
32355 bytes.
ABBREVIATED CERTIFICATION METHODOLOGY FOR SENSITIVE INFORMATION TECHNOLOGY SYSTEMS

ciacg17.txt
26624 bytes.
CIAC G-17 March 12, 1996: Vulnerabilities in sample HTTPD CGIs

c_lesson.zip
45599 bytes.
C Language Programming Course

denial.txt
48164 bytes.
Introduction to Denial of Service

dialout1.txt
67840 bytes.
Novice Manual On Using Outdial Modems by Blue Adept

evaluats.txt
61786 bytes.
Trusted Product Evaluation Questionnaire

findhole.txt
16372 bytes.
Security Holes -- Q and A sheet of Security Holes 93/11/10

findholz.txt
12288 bytes.
Security Holes Manifest Themselves in Four Ways

fwallfaq.txt
46234 bytes.
Firewalls FAQ

gcs.txt
8069 bytes.
Government Security -- This file tells about Government

standards, and information concerning computer security.
hacethic.txt
5114 bytes.
The Hacker's Ethics

hack.txt
3996 bytes.
On Hacking (General)

hack9.txt
5264 bytes.
H.A.C.K. #9

hackenc.txt
142485 bytes.
The Hackers Encyclopedia (1995-1996) by Logik Bomb

hacker01.txt
152735 bytes. by G. Meyer (1989)
The Social Organization of the Computer Underworld

hacker16.txt
19113 bytes.
Hacker's atlas of the world

hackcrm.txt
58203 bytes.
Are Computer Hackers criminals?

hackholl.txt
4464 bytes.
Hacking in Holland

hackn101.txt
3296 bytes.
Hacking 101

hacklink.txt
20392 bytes.
Links to Hacking Information

hackserv.txt
6060 bytes.
Hacking Servers: a Beginner's Guide by Lord Dredd

hacktech.txt
8728 bytes.
Hacking Techniques

hacktecq.txt
11445 bytes.
Hacking Techniques

handbook.txt
337314 bytes. (1985)
The Hacker's handbook

hirehack.txt
10133 bytes.
Hiring a Hacker

hk_acces.txt
43858 bytes.
Logical Access Control

hk_i_a.txt
36721 bytes.
Identification and Authentication

hk_polic.txt
28491 bytes.
Computer and Information Security Policy

hk_progm.txt
24687 bytes.
Security Program Management

innerc.txt
15574 bytes.
Blindman's Bluff, Hacker Style

innercir.txt
9736 bytes.
Hacking Techniques -- Various diffrent ways to take a run

at a system. Other then the normal expected ones.
intro.txt
6904 bytes.
An introduction to the world of hacking, for newbies

jul93blt.txt
15600 bytes.
CSL Bulletin - Connecting to the INTERNET: Security Considerations

longpass.txt
13869 bytes.
How useful ARE longer passwords?

magic_co.txt
9905 bytes.
Cracking the MIT-MAGIC-COOKIE-1 Authorization protocol

menace.txt
6446 bytes.
The Hacker Menace

messcomp.txt
2849 bytes.
Messing with someone's computer - by Archangel

miscinfo.txt
2816 bytes.
'PIRATE EASY' Telcom Hacking Info,Proto's,Security

mob.txt
8763 bytes.
Hackers In The Mob?

morality.txt
2637 bytes.
Hacker Morality

ms_is.txt
3728 bytes.
Microsoft Index Server exposes IDs and passwords

mulg3.txt
7296 bytes.
"Miskatonic University Learning Guides" #3 - advice for beginning hackers

nasahaxz.txt
5648 bytes.
The NASA Hackers

ncsc_oas.txt
109919 bytes.
NCSC Guideline on Office Automation Security

newbie.txt
64593 bytes.
Ultimate Step by Step Guide to Become a Hacker

nhg.txt
42880 bytes.
LOD/H Novice's Guide to Hacking, Dec.1988

nighthak.txt
14774 bytes.
Night of the Hackers

nist_prt.txt
15703 bytes.
NIST Computer User's Guide to the Protection of Information Resources

noidcryp.txt
1025 bytes.
Security without Identification - a bibliographic reference

nyt.txt
9979 bytes.
New York Times Article On Phreak/Hacks

passch.txt
10394 bytes.
How to choose secure passwords

primer.txt
102648 bytes.
Prevention Thru Recovery

riscos_r.txt
1195 bytes.
Access the shadow passwd file on a Riscos machine

risks.txt
5134 bytes.
Advice on how not to get caught hacking

ruhacker.txt
1501 bytes.
Are you a Hacker? By ReDragon

satcon.txt
2841 bytes.
Controlling the orbital dynamics of satellites!

satcaper.txt
7109 bytes.
The Satellite Caper

scanprg.txt
5542 bytes.
What to look for in a scan program

securick.txt
52487 bytes.
How to Improve your Security -- This is a paper from Sun

MicroSystems, on how to break into a system, so you'll know where your system's holes are. Perfect for use on the "other" end........heh heh heh......
securid.txt
3602 bytes.
9x Presents Info on SecureID Issue 0002

securit1.txt
30167 bytes.
Computer Emer. Respose Team

security.txt
66922 bytes.
Computer Security by E.A. Bedwell

starlink.txt
27266 bytes.
Starlink Info/Index

starthak.txt
85478 bytes.
The Ultimate Beginners Guide to Hacking and Phreaking by Revelation/LOA (96/08)

sundevil.txt
29152 bytes.
2600 Magazine's perspective on Sun Devil etc.

tacdial.txt
15287 bytes.
TAC Dialups

teltermz.txt
13604 bytes.
Terminal Identifiers

tihack1.txt
530 bytes.
Hacks for the TI-82/85 Calculator

tihack2.txt
30131 bytes.
Hacking the TI-85 Calculator

top10pwd.txt
1006 bytes.
The top 10 passwords...

ueber.txt
8958 bytes.
Becoming an Uebercracker, and thus, an ueberadmin to stop crackers

ukguide.txt
13650 bytes.
Guide to Online Systems in the U.K.

ulthack.txt
64909 bytes.
Ultimate step by step guide to become a hacker

usrguide.txt
16035 bytes.
NIST Computer Users Guide - anti-hacking measures for the common user

vas015.txt
10617 bytes.
VAS #15: Merit/Michnet Hacking Issue

vas117.txt
7708 bytes.
VAS 117: The Death of Hacking

vmadmin.txt
3010 bytes. (1995)
A Guide to Administration on VMan Systems, by Sire and Psyclone (UK)

vthack1.txt
9808 bytes.
Virginia Tech Hacking File 1

vthack2.txt
9335 bytes.
Virginia Tech Hacking File 2

vthack3.txt
29135 bytes.
Virginia Tech Hacking File 3

washlod.txt
13183 bytes.
An article on the LOD busts

wellman.txt
77935 bytes.
Commands & Oper. Manual For THE WELL

winhack.txt
2028 bytes.
An easy Win hack

wozbabe.txt
1672 bytes.
Wozniak is behind hacking

hack6faq.txt
76168 bytes.
#Hack FAQ Beta .006


Hacks not specific to a single platform

mult5684.htm
2810 bytes. (2002)
Bypassing VirusWall
Exploit   Linux   Windows  
mult5602.htm
4116 bytes. (2002)
Flaw in calloc and similar routines
Multi Platform  
openafs.txt
6996 bytes. (2002)
OpenAFS 1.2.5 Remote Root Vulnerability
Advisory   Multi Platform  
mult5542.htm
3184 bytes. (2002)
Python language \'pickle\' primitive exploit
Exploit  
mult5166.htm
13232 bytes. (2002)
RADIUS client/server remote overflow (buffer/heap)
Multi Platform   Exploit  
mult4853.htm
46671 bytes. (2001)
Radius protocol weakness, Radius client implementation
Multi Platform   Exploit  
800-8.txt
102444 bytes. by NIST
Security Issues in the Database Language SQL
Multi Platform   Essay  
mult5094.htm
51972 bytes. (2002)
SNMP bad protocol implementation leads to vulnerability in all systems
Exploit  

lol, wtf?
1 Whoa, bro... Access denied for user 'root'@'localhost' (using password: NO) [an error occurred while processing this directive]

Site design & layout copyright © 1986-2014 THC