![]() |
General | Newbies | Advanced | Rainbow Books
|
Hacking: General | |||
---|---|---|---|
File | Size | Title | Author |
HackersEthics_Dissident.txt | 6k | The Ethics of Hacking | Dissident |
HackersHandbook.zip | 170k | The Hacker's Handbook | Hugo Cornwall |
HackersHandBookShort.txt | 6k | Hacker's Handbook | ??? |
HackerTest.txt | 20k | Hacker Test Are you a hacker? |
Felix Lee, John Hayes, & Angela Thomas |
HackerzJargon.zip | 504k |
Hacker's Jargon File v3.3.1, Jan 25, 96 |
hackers :) |
LOA_HackEnc.zip | 60k | The Hacker's Encyclopedia |
Logik Bomb (LOA-ASH) |
MentorsLastWords.txt | 3k | Mentor's Last Words | The Mentor |
TheMHDR.zip | 193k | The Modern Hacker's Desk Reference | The Rhino9 Team |
E-mail_AnonServ.txt | 1k | List of Anonymous E-mail Servers | ??? |
Hacking: Newbies | |||
---|---|---|---|
File | Size | Title | Author |
CommonSense.txt | 4k | *Someone stole this off BroncBuster's page* | Bronc Buster |
CrackerJack.txt | 5k | The Basics Of Hacking | Cracker Jack |
E-mail_Spoofing.txt | 2k | Mail Spoofing Explained | Duncan Silver |
E-mail_Tracing.txt | 40k |
Net Abuse FAQ addition Tracing Spoofed E-mail |
Gandalf the White O |
GoodHackBG.zip | 18k | Good Hack Beginner's Guide | van hauser / THC |
GTMHH-BS.zip | 54k |
Guide To Mostly Harmless Hacking Beginner's Series |
Carolyn Meinel M/B Research The Technology Brokers |
IceKool.zip | 22k |
Ultimate Step-by-Step Guide To Becoming A Hacker |
Ice Kool |
KnightsOfShadow.zip | 10k | Basics Of Hacking | The Knights Of Shadow |
LOA_UltBegGuide.zip | 25k |
The Ultimate Beginner's Guide to Hacking and Phreaking |
Revelation (LOA-ASH) |
LOD_Novice.txt | 43k |
A Novice's Guide To Hacking - 1989 Edition |
The Mentor LOD/LOH |
neophyte1.txt | 18k | The Complete Neophyte's Guide to Hacking | GerM |
neophyte93.zip | 52k | The Neophyte's Guide to Hacking | Deicide |
OptikLenz-LOU.txt | 27k | LOU Hacking Guide | Optik Lenz |
Phantom.txt | 48k | The Phantom's Beginner's Guide to Hacking | The Phantom |
Plowski.txt | 44k |
Newbies Handbook How to begin in the world of H/P |
Plowski Phreak |
SirHackalot_Unix.txt | 31k | UNIX: A Hacking Tutorial | Sir Hackalot |
TechHack_LOD.txt | 9k | Technical Hacking: Volume 1 |
The Warelock, SABRE elite, & Lords of Darkness |
VanHauser_Unix.txt | 8k | How To Become a UNIX Hacker | van hauser / THC |
Hacking: Advanced | |||
---|---|---|---|
File | Size | Title | Author |
Attack_DOS_intro.txt | 45k | Introduction To Denial Of Service | Hans Husman |
Attack_Finger.txt | 14k | Attacking From The Outside | t95hhu |
Attack_FtpBounce.txt | 10k | The FTP Bounce Attack | *Hobbit* |
Attack_FtpHackbyCham.txt | 1k | Hack by: Cham | Cham |
Exploit_MSDNS.txt | 4k |
Microsoft DNS Server Subject to Denial Of Service Attack |
Rep: Stefan Arentz |
Exploit_MSIEBugs.zip | 14k | 6 MSIE Bug Exploits | --- |
Exploit_MSIndServBug.txt | 4k | MS Index Server Exposes IDs & PWs | Rep: Andrew Smith |
Exploit_SendMail.txt | 33k | 3 SendMail Exploits | --- |
Exploits_LS.txt | 4k | 2 NetExploits | Lord Somer |
GTMHH.zip | 127k | Guide To Mostly Harmless Hacking |
Carolyn Meinel M/B Research The Technology Brokers |
HackTechniques_Inner.txt | 10k | Hacking Techniques |
Excerpt from: The Inner Circle Book |
IP_Addressing.txt | 14k | Post regarding IP Addressing | Wally Linstruth |
IP_DisguiseWithProxy.txt | 3k |
Using Web Proxies to Disguise Your IP Address |
Hardcore Pawn |
IP_FAQ.txt | 35k |
Internet Protocol FAQ LM: 04-01-96 |
Maintained by: George V. Neville-Neil |
IP_Firewalls_FAQ.txt | 30k | Internet Firewalls FAQ | --- |
HiJackAttack.txt | 46k | Simple Active Attack Against TCP | Laurent Joncheray |
MitnickAttack.txt | 18k |
How Mitnick hacked Tsutomu Shimomura with an IP sequence attack |
Source: Tsutomu Shimomura comp.security.misc |
IP_NNTP_LOU.txt | 13k | Utilizing The NNTP Port |
PLaZma (LOU) |
IP_SMTP.zip | 24k | Simple Mail Tranfer Protocol | Jonathan B. Postel |
IP_Sniffing.txt | 19k | Sniffer FAQ version 1.7 |
Maintained by: Chris Klaus |
IP_SocketServices.txt | 3k | Socket Services | Relevation |
SPingInfo.zip | 6k | SPing Information | darkening.com |
IP_Spoofing_Brecht.zip | 21k | A short overview of IP Spoofing | Brecht Clærhout |
IP_TcpDaemonFun.txt | 13k | Playing with the Internet Dæmons | Voyager[TNO] |
IP_TcpDHCP.txt | 43k | DHCP FAQ | John Wobus |
IP_TcpIBMPC_FAQ.zip | 42k |
IBM PC TCP/IP FAQ LM: 02-01-94 |
Bernard Aboba |
IP_Tcp-Intro_CSFG.zip | 30k | Introduction to the Internet Protocols | Charles L. Hedrick |
IP_Tcp-Intro_Heresy.txt | 14k | TCP/IP: An Overview | Kweiheri Tron |
IP_TcpNetBiosCiFS.zip | 45k | Common Insecurities Fail Scrutiny | *Hobbit* |
iRC_BackDoors.txt | 9k |
Bugs and Backdoors in IRC clients, scripts and bots |
orabidoo |
iRCInfoLS.zip | 11k | Informational texts on IRC | Lord Somer |
iRC_SocEng.txt | 2k | IRC Social Engineering | Optik Lenz |
MSDosNetworks.txt | 20k |
Make your network compatible with MS-DOS 6 |
??? |
ArpanetVirus.txt | 14k | Modified version of Arpanet Virus | ShadowSpawn |
FileSystemTracing.txt | 34k |
NFS Tracing by Passive Network Monitoring |
Matt Blaze |
Milnet.txt | 5k | Hacking the Milnet | SwipeLogic Inc. |
Telenet_JRoger.txt | 3k | Telenet | the Jolly Roger |
Telenet_USDialUps.txt | 11k | Telenet dialups for the US | --- |
TelenetBasics.txt | 7k | The Basics of Telenet | ??? |
TelenetScanning.txt | 8k | Telenet Scanning | ??? |
TelenetSecExp.txt | 10k | Telenet The Secret Exposed | CH&AOS |
TelenetTermIDs.txt | 13k | Terminal Identifiers | ??? |
Telnet_Exploits_Ch.txt | 17k | Chapter 5: Telnet |
Excerpt from: ??? |
Telnet_GettingURLs.txt | 3k | Getting URLs Through Telnet | PlahZma |
Telnet_FlashHack.doc | 6k | Hacking Telnet | The Flash |
Telnet_OutDials.txt | 2k | Working Out Telnets | ??? |
Telnet_OutDialsWonko.txt | 3k | Dialout List | \/\/onko the õane |
Telnet_SiteList.txt | 31k | untitled | --- |
TheProphet_Unix.zip | 44k |
UNIX Use & Security from the Ground Up |
The Prophet |
TymNet.txt | 6k | Hacking Tymnet | Silicon Rat |
Unix_BackDoors.txt | 19k | BackDoors | Chris Klaus |
Unix_Bible.zip | 28k | The UNIX Bible |
Psychotic Internet Services |
Unix_Commands.txt | 23k | Useful UNIX Hacking Commands | Scott Walters |
Unix_CommandsRebel.txt | 31k | UNIX Communications Commands | The Rebel |
Unix_EraseLog.txt | 2k | How do I erase my presence... ? |
Excerpt from: ??? |
Unix_KeepRootInfinity.txt | 19k | Holding onto root |
Excerpt from: The Infinity Concept Issue II |
Unix_NetCat.zip | 24k | NetCat 1.10 | --- |
Unix_NetCatWebProxy.txt | 5k | NetCat Browser Proxy Script | --- |
Unix_NetCatWebSearch.txt | 3k | NetCat Web Search Script | --- |
Unix_RaisingHell_SMC.txt | 13k | Raising Hell With UNIX |
Kryptic Knight - S M C - |
Unix_RedKnight.txt | 42k | Hacking UNIX |
Red Knight P/H-UN |
Unix_Tips.txt | 9k | UNIX - Odds & Ends |
Excerpt from: ??? |
Unix_TrojanHorses.txt | 12k | UNIX Trojan Horses | ??? |
UnixPass_Ch.txt | 2k | Passwords |
Excerpt from: ??? |
UnixPass_God.doc | 4k | UNIX Default Password List | God |
UnixPass_Krypto.txt | 17k | Cracking that "Passwd" file | Krypto |
UnixPass_LordDev.txt | 8k | How to crack a UNIX password file | Lord Devious |
UnixPass_OleBuzz.txt | 25k |
Tutorial on MACCRAC & UNIX passwd file hacking |
Ole Buzzard |
UnixPass_Phf.txt | 1k | PHF Vulnerability | Duncan Silver |
UnixPass_UltGuide.txt | 12k | The Ultimate Guide to Passwd Files | Goat |
UnixPass_WebBrowser.txt | 6k | Hacking From Your Web Browser | Modify |
Vax_FAQ.txt | 32k | dec-faq/vms | --- |
Vax_HackingDL.zip | 10k | "What's Hacking?" Series on VAX | David Lightman |
Vax_HackingLOD.txt | 24k | Advanced Hacking VAX's VMS |
Lex Luther & LOD/H |
Vax_HackingManiac.txt | 5k | VAX VMS Hacking | Metal Maniac |
Web_HackMsgBrds.txt | 3k | How To Hack WWWebBoards 2.0 | KM |
Web_PagesCh.txt | 4k | Hacking Webpages |
Excerpt from: ??? |
Web_PagesGoat.txt | 12k | Hacking WebPages | Goat |
Web_PagesVCP.doc | 37k | Hacking Webpages The Ultimate Guide |
Virtual Circuit & Psychotic |
Web_Spoofing.txt | 21k | Web Spoofing: An Internet Con Game |
E. W. Felten, D. Balfanz, D. Dean, & D. S. Wallach |
WebWormExplained.doc | 44k | Crisis & Aftermath (the Internet Worm) | Eugene Spafford |
Win95_CdKeys.txt | 1k | Dig up hidden CD Keys | ??? |
Win95_KeyGen.txt | 16k | Tutorial on Key Generators | raZZia |
Win95_PublicAccHack.txt | 5k |
Breaking Out of Restricted Windows 95 Environments |
BioMenace |
Win95_RegKey.txt | 1k |
Changing the Registration Name in Windows 95 |
??? |
Win95_SMB.txt | 3k | SMB Attacks on Windows 95 | --- |
Win95_WorkSpaceHack.txt | 1k | A Win 95 User Hack | SubAtomic |
WinNT-TCPiPfaq.zip | 81k | The TCP/IP FAQ (WinNT) | --- |
XWindowsSecurity.txt | 12k | X-Windows Security | runeb / cF |
Hacking: The Rainbow Books | ||
---|---|---|
Color/File | Size | Title |
Aqua.zip | 667k | Glossary of Computer Security Acronyms |
Blue.zip | 19k | Trusted Product Evaluation Questionarre |
Brown.zip | 29k | A Guide To Understanding Trusted Facility Management |
DarkLavender.zip | 17k | A Guide To Understanding Trusted Distribution In Trusted Systems |
Green.zip | 14k | DOD Password Management Guideline |
Grey.zip | 40k |
Trusted UNIX Working Group (TRUSIX) Rationale For Selecting Access Control List Features For The UNIX System |
LiteBlue.zip | 18k | A Guide To Understanding Identification & Authentication |
LusciousOrange.zip | 64k | DOD Trusted Computer System Evaluation Criteria (TCSEC) |
OrangeII.zip | 42k |
A Guide To Understanding Configuration Management In Trusted Systems |
Peach.zip | 17k |
A Guide To Writing The Security Features User's Guide For Trusted Systems |
Pink.zip | 45k | Rating Maintenance Phase Program Document |
Purple.zip | 18k | Guidelines For Formal Verification Systems |
Red.zip | 246k |
DOD Trusted Computer System Evaluation Criteria (TCSEC) Extensions |
RedII.zip | 35k | Trusted Network Interpretation Environments Guideline |
VeniceBlue.zip | 17k | Computer Security Subsystems |
Yellow.zip | 21k |
Guidance For Applying The DOD Trusted Computer Systems Evaluation Criteria In Specific Environments |