Contents
Exploits
Privacy
Texts
Products
Tutorial
Ethics
Windows NT
Linux
Programming
Dictionary
Hype
Chat
Phreaking
Links
Email
Home
Search
Text Files

Knowledge is power, and you learn things from reading. For those of you with functional brain cells, here is a large collection of text files related to security, hacking, exploits, and other similar material. I review each file put up on here, so the majority of texts are worth taking a look at.

Disclaimer: I did not write any of the following files, and do not take any responsibility for the actions of the reader based upon knowledge and information covered in them. They are ONLY for informational purposes.

General UNIX
Program Specific
Other Operating Systems
TCP/IP and Misc. Networking
Packet Switched Networks
Hacking Literature
Miscellaneous




General UNIX
Hacking tips for UNIXA description of a few small hacks
Improving the Security of Your Site By Breaking Into It A very detailed guide for admins that outlines several common security holes and methods hackers use to break in.
A UNIX Hacking TutorialOne of the best UNIX tutorials out there, goes from the basics up- very complete and excellent for the beginner.
COPS & Robbers-UNIX System SecurityAn outline of analyzing a UNIX system's security with the COPS program.
UNIX Security ChecklistOutlines common errors in administration and general security guidelines.
Unix System VHow to hack UNIX System V
UNIX BackdoorsHow to hold on to root.
Hacking UNIXBasic tutorial of UNIX security.
Bourne ProgrammingA thorough shell programming manual.
Architectural Overview of UNIX Network SecurityAn excellent guide to the layered security of networked systems.



Program Specific
Crash Course in X Windows SecurityExplains the security risks of X Windows including screen capturing.
The SMTP Protocol A complete description of the Simple Mail Transfer Protocol
Sendmail 8.6.4 BugSecurity hole that allows user to get root shell
NFS Tracing By Passive Network MonitoringSpying on ethernet traffic to gain information on NFS filesystem activity.
Crontab ExploitTakes advantage of a buffer overflow problem.
Internet Email SecurityA good discussion of sendmail and some of its basic flaws.
Smashing the Stack for Fun and ProfitExcellent article explaining buffer overflows.



Other Operating Systems
Vax/VMS basics A FAQ for new users of Vax/VMS systems, good for beginners.
Hacking VAX Informative file on security protocols and measures on VMS.
The HP3000Information on hacking Hewlett Packard's HP3000 mainframes.



TCP/IP and Misc. Networking
How Kevin Mitnick hacked Tsutomu Shimomura with an IP sequence attack Very interesting, requires a knowledge of TCP/IP to understand.
Source RoutingAn explanation of source-routing in conjunction with an IP spoofing attack and other situations.
IP AddressingInformation on the format of IP addresses, interesting but not for newbies.
TCP/IP WeaknessesFlaws in BSD's protocol software.
Simple Active Attack Against TCP/IPRerouting TCP data streams to bypass authentication protocols such as kerberos.
DHCP FAQA thorough guide to the Dynamic Host Configuration Protocol
Ethernet FAQFAQ of Ethernet terminology.
The Novell Netware Hack-FAQA good resource on basic Netware security.



Packet Switched Networks
Tymnet Hacking Brief notes on hacking the Tymnet network .
Telenet: The Secret ExposedA very thorough guide to using/hacking Telenet.
Packet Switched NetworksA guide to Sprintnet and similar networks



Hacking Literature
Mentor's Last WordsPowerful words of wisdom, just read this.
The Hacker Test Funny (if you understand it) and educational.
Diary of a HackerFirst person account, very interesting.
Diary of a Hacker IIThe second part of the diary.
Concerning Hackers Who Break into Computer SystemsInteresting analysis of the hacker culture presented at the 13th National Computer Security Conference
Becoming an an UebercrackerNot a serious guide, this is simply hilarious. Just read it and see for yourself.



Miscellaneous
How to Find Security HolesConcepts in finding security breaches, mainly in software code.
Social EngineeringExploiting human weakness-tricking people into revealing sensitive information.
Hole ListA lengthy compilation of security holes.
Denial Of ServiceUnethical but I included it for informational purposes, it explains how to flood services, crash servers, etc.
Hacking TechniquesA VERY basic text file describing a few simple tricks.
The Internet WormExplains exactly what happened and how it worked.
The Risks of Key Recovery, Key Escrow, and Trusted Third-Party EncryptionAn excellent article on modern cryptography.
Getting InformationSome methods of gaining information about people.
Cracking the UPCExplanation of the barcoding system.


© 1998 Acid_burn