- -=[ Recently Added on 12-05-98 ]=-
|
Off-line hacking manual for Windoze NT! Written Cengoman! 1998
Read Digital Rebels Ezine- Topics disccused
Advice For Newbies;AOL Gateways;Basic Unix Hacking;Be Paranoid;Contact;Destructive Devices; How to use Outdials;Introduction to C;New Members;Obtaining and Cracking a UNIX Password File (Part 1);Password Crackers;Scanners;Techniques to Hide One's Identity;Trojans;Web Page Hacking For Newbies
Read Keen Veracity Issue #5 written by LOU Members
How to Bypass '403' Proxy Bans - Written by J.C.
Anti-Netbus How to remove it. Written by: Vi0lent-J
APC PowerNet SNMP vulnerability
Security bugs in Excite for Web Servers 1.1
Freestats.com CGI vulnerability
How to Get Your friend\enemy's ISP password - Written by F-o-X
Hacking Angelfire - Written by f1ber 0pt1k
Hacking Notes Part 1 - Written by Encrypt
Hacking Notes Part 2 - Written by Encrypt
Eliminating the Hypermart Popup Windows - Submitted by Anime Pitstop
Infod AIX exploit
Linux ICQ Clone has a DoS Exploit
Keeping a low profile on UNIX systems - Written by Peter Baylies
Black Wolf's Guide to Memory Resident Viruses
Netscape Communicator 4.5 can read local files
List of public proxies ; These should issue you a new 'spoofed' ip, for 'stealthed' surfing
Dark Angel's Phunky Virus Writing Guide Part 1
Dark Angel's Phunky Virus Writing Guide Part 2
Dark Angel's Phunky Virus Writing Guide Part 3
Dark Angel's Phunky Virus Writing Guide Part 4
Dark Angel's Phunky Virus Writing Guide Part 5
List of some common exploits - Quick Hacks
Shell Programming Introduction by da chronic
The New Valise E-mail Hack - Written by XPh33rX
The Macro Virus Writing Tutorial Part 1 - Written by Dark Night of VBB
Virus programming (basics)
Virus programming (not so basic)
Introduction to VMS - Part I - Written by
gr1p of b4b0 (www.b4b0.org)
Introduction to VMS - Part II - Written by
gr1p
Introduction to VMS - Part III - Written by
gr1p
Read Keen Veracity Issue #4 written by LOU Members
How to Bypass '403' Bans - Written by J.C
Juno Hacker Text v1.0 - by:NiDgiD
FoolProof for PC Exploit
AIX infod Exploit
The Son of Cuartango Hole - This is suppose to be able
to get around Microsoft's latest fix for the original cuartango hole. Addtional Information
on this can be found at -
http://pages.whowhere.com/computers/cuartangojc/son1.html
The Frame Spoofing vulnerability - The vulnerability enables the author of a nefarious Web site or email message to "spoof" information presented by another Web site. More information can be found here http://www.securexpert.com/framespoof/index.html
DoS attack on IE Users - Java Applet that Crashes Internet Explorer 4.x and higher (possibly the os's as well 95/98/NT) Source Code available here.
A short overview of IP spoofing: PART I
Geocites TriX - Maintaining your "Illegal" Page at Geocites without getting it removed. By - Cyber Thief
[Linux] klogd 1.3-22 buffer overflow
Giant MAC Excel security hole
How To Write A Virus For The Macintosh
DoS attack on IE Users - DirectDraw bug causes crashes.
This is the same information on the applet as the one above but I guess someone else re-released the code.
Turn nukenabber 2.x into a protection against back orfice or netbus by sub-Zer0
An Introduction to executing arbituary code via stack overflows
pIRCh Exploit - pIRCh automatically assigns your main pirch directory to where DCC downloads are sent. Exploit: You can replace someone's script file with a malicious one.
Security Configuration Editor - by Mircosoft - NT Service Pack 4 includes support for the Microsoft Security Configuration Editor (SCE). SCE allows system administrators to consolidate all security related system settings into a single configuration file.
Sequence Number Attacks By Rik Farrow
Smurf the DoS attack Information on what Smurf is and how to minimize the effects of this script. Includes information on tweaking Cisco routers by Craig A. Huegen.
Swish-E Vulnerabilities - Swish-e and the accompanying configuration package AutoSwish contain vulnerabilities in the source code of the indexer
Several new CGI vulnerabilities
WWWBoard v2.0 ALPHA Vulnerability - Many vulnerabilities have been found in the popular WWWBoard script written by Matt Wright. This exploit does even one better than just 'messing up' the board, if done severly enough, it can cause the wwwboard.html file to become hundreds of megabytes in size.
RippinG 0fF Zippo's - BY |[xHostiLe]|
I/O Magazine Issue #3
Guide to [Unix/Linux/BSD/SySV/SunOS/IRIX/AIX/HP-UX] Hacking (HUGE) 537kb By: Invisible Evil
Step by Step NT Explotation Techniques by vacuum of Rhino9 & Technotronic
DoS attack against people using AOL instant messenger
SSH insertion attack
CPU DoS against NukeNabber (NT only?)
IRC passw0rding BY: |[xHostiLe]|
Communicator 4.5 stores EVERY mail-password in preferences.js
Placing Backdoors Through Firewalls
Killing Phone Lines by ╔┼ZÑ M╓╤╔Ñ
Security Holes in CONSEAL PC Firewalls by ╔┼ZÑ M╓╤╔Ñ
/tmp/.X11.* has exploitable default permissions on many systems. Exploit code included
Hidden community string in SNMP implementation in Sun Solstice Enterprise Agent and Solaris (remote root compromise)
BIOS Backdoor Passwords
DoS Attacking and Defending from a DoS attack by |[xHostiLe]|
buffer overflow in ssh-1.2.26 when compiled with Kerberos5
Solaris 2.6 /usr/dt/bin/dtappgather still contains a security hole
ssh 1.2.26 vulnerability; buffer overflow in "sshd" logging facility of SSH up to and including SSH 1.2.26.
Buffer overflow exploit for Netscape on x86 Linux
Getting a Free ISP Account(s) By: dr0z
ANTI-BO.txt version 0.1.2; Learn more on Back Orfice
Hiding your IP Via Anonymizer.com or other Proxy servers by
Freakster8
Listing of International DNS Domains By: dr0z
Linux Info: Part 1 The Basics
By: dr0z
Linux Info: Part 2 - Closing Ports, Restricting Telnet Access, Firewall, PPP By: dr0z
How to rid yourself of the Tripod Ad by Lanham
Read LOU's OCT Issue of Keen Veracity 3
cgimail-NT-hack send files (if you know the path) via an email
ftpbounce-attack -The Microsoft ftp service, as provided for by Internet Information Server can be configured to allow connections from only certain ("trusted") IP addresses. This paper describes how this security arrangement could be by-passed depending on th e configuration of the remote network.
Ftpcrack.pl - This script will connect to an ftp site and then test the Administrator account with a list of passwords that are read from a text file (cracknt.txt)
Easy way to get Admin rights on an NT
Yet Another Way to Hack NT Remotely
Netbios - NT/Win95/Win98 comes with a utility NBTSTAT which is used for viewing NetBIOS information. This tool can be used for snooping
information about remote machines
Hacking NT if Perl.exe is loaded
If you have WebTV Some things you should know; Web TV owns your cache
System Failure Issue #14
SL-Mail ver 3.0.2423 security
Sendmail up to 8.9.1 - mail.local instroduces new class of bugs
Dump a mode --x--x--x binary on Linux 2.0.x
Know your PORT NUMBERS
By-passing MS Proxy packet filtering
Kill all the bandwidth out of MacOS up to 8.*
Security concerns in linuxconf shipped w/RedHat 5.1
Cuartango - If you run IE4, Your computer is at risk a malicious VBScript can get full control over your system. *PATCHED*
Cuartango - IE4 can transmit computer files to a WEB site by a malicious Script. *PATCHED*
Crash AOL 4.x software by sending Email
Back Orifice Buttplugs and Goodies FAQ
Yet ANOTHER hotmail hack. Get user ids/pws from javascript
Yahoo Pager Client Emulator Thing
his script, run on a regular (daily) basis, keeps tabs on root accounts and set[ug]id root files
Major ICQ security hole ; log in to the ICQ servers as ANYONE without having to know their password
Backorfice Information
Wingate Spoofing On IRC by athor1ty
Ircn Exploit..
WinGate version 2.1 Exploitable
Confidence Remains High Issue #9
An Introduction To Hacking Around With The UNIX Operating System Part I by Netdiablo
A Beginners Introduction To Hacking Around On The UNIX Operating System Part II by Netdiablo
Nestea Vulnerability (Linux Oversized Fragment Vulnerability)
Vulnerability in FrontPage Server Extensions
AOL Instant Messenger (AIM) protocol information and password decoder
RemoteAdmin/AOL Server 2.2
The old Hotmail Hack.*PATCHED*
Secure your Wingate Installation from Abusers
Numerous DoS attacks against Eggdrop1.3.17 Bots
In P51-02 (Phrack) someone mentioned Ethernet spoofing.
C programming for the complete newbie by Krisis
How to fuck up a NoN-Moderated Mailing List by DeadSock
Placing Backdoors Through Firewalls
How to hack Valise E-Mail Accounts by Kronik
Icq File Spoofer
IRIX 6.2 'at' security hole
An Introduction To The Internet And TCP/IP by Netdiablo
changes mode on /etc/passwd to 777 making it writeable by anyone.
New Perl.exe, IIS exploit
Windows95 Proxy (Wingate/StarTech) DoS Vulnerabilites
ASP vulnerability with Alternate Data Streams
Part 2 of StuBoy's Netware hacking tips
Part 1 of StuBoy's Netware hacking tips
WHC's Guide to Basic Hacking
textcounter.pl SECURITY HOLE *yet another fuckup by Matt Wright*
Sendmail 8.6.4: Program and script to obtain a root shell
Hacking ICQ: Techniques and Methods by SoulburnX
AOL Instant Messanger DoS attack
Keen Veracity Issue #1 part
2
Keen Veracity Issue #1 part 1
Confidence Remains High Issue #8
Confidence Remains High Issue #7
Confidence Remains High Issue #6
Confidence Remains High Issue #5
Confidence Remains High Issue #4
Confidence Remains High Issue #3
Confidence Remains High Issue #2
Confidence Remains High Issue #1
For Webmasters on Geocities, bypass the Geocities ads to Java User by Agent 9
Get into someone elses work space in Win95 by Sub-Atomic
Breaking out of restricted Win95 Environments by BioMenace
Explanation of the MSIE 3.0 bug by Goat
Cert Advisory: Buffer Overflow Problem in rdist
Hacking Webpages by Goat
Turning your Mail Bomber into a ICQ Pager Bomber by Sandman
The Ultimate Guide Passwd Files by Goat
Exploiting Net Administration Cgi's like nethosting.com by Lord Somer
IRC-Social Engineering by OptikLenz
Hacking Guide by OptikLenz
Hacking Servers 101 by ChronicK
Guide To (mostly) Harmless Hacking ; How to Get a *Good* Shell Account Part 2
Guide To (mostly) Harmless Hacking ; How to Get a *Good* Shell Account Part 1
Guide To (mostly) Harmless Hacking ; Hacking from Windows 3.x, 95 and NT
Guide To (mostly) Harmless Hacking ; Hacking into Windows 95
Guide To (mostly) Harmless Hacking ; Hacking from Windows 95
Guide To (mostly) Harmless Hacking ; More intro to TCP/IP: port surfing
Guide To (mostly) Harmless Hacking ; Linux
Guide To (mostly) Harmless Hacking ; How to nuke offensive Web sites
Guide To (mostly) Harmless Hacking ; How get email spammers kicked off their ISPs
Guide To (mostly) Harmless Hacking ; How get Usenet spammers kicked off their ISPs
Guide To (mostly) Harmless Hacking - How Finger can be used as one of the most common ways to crack into non-public parts of an Internet host
Guide To (mostly) Harmless Hacking ; Forge Email and how to spot Forgeries
Guide To (mostly) Harmless Hacking ; How to finger a user via Telnet
Guide To (mostly) Harmless Hacking ; Computer Crime Law Issue #1
Guide To (mostly) Harmless Hacking ; BeginnersÆ Series #1
Common questions on exploits. Written by Miah
Good Background on hacking Part 2
Good Background on hacking Part 1
Hacking Angelfire Accounts by HotWired
A Known Plaintext Attack on the PKZIP Stream Cipher
Quicken 3.0 Back Door; Defeating the Quicken Password
Quicken 5.0 PW Hacking
Quickbooks Pro v5.0 for Windows PW Hacking
Password Recovery Techniques for Cisco Routers
Mind Your Own Business (MYOB) PW Hacking
MS Money 2.0 Back Door PW Hacking
Decrypting Act! v2 for Windows passwords
Where to find Shell accts.
Useful UNIX Hacking Commands, and Some Hints On Their Usage
Tracing an e-mail message
Have a shell in 24hours after reading this
Sendmail 8.7.5 ; any local user can gain root priveledges
Using web proxies to disguise your IP address by Hardcore Pawn
How to hack optichat orignal chat by Sniper
Guide to (mostly) harmless hacking - Linux -
Exploits (What are they?) by Miah
Mail Spoofing by Duncan Silver
Sendmail bug exploit by Duncan Silver
PHF Text by Duncan Silver
Sendmail Bug List for different Versions
X Windows Security
TCP Port Stealth Scanning
smash the stack; Buffer Overflowing
Utilizing the NNTP port. Forging/reading/posting by Optiklenz
Attacking from the outside
The Hotmail Hack by Digital*PATCHED*
Deleting Entrys in LPage Guestbooks by 0ptikLenz
The Complete Neophyte's Guide to Hacking by Germ
The Psychotic Internet Services' Unix Bible- A reference for all of us.
Psychotic FAQ Version 2.0
Exploits and Telnet by Virtual Circuit
Hacking Webpages by Virtual Circuit
Cracking Unix passwords by Virtual Circuit
*P*S*Y*C*H*O*T*I*C* Issue #1 - Very Informative
Hacking Tripod Accounts by Negative Rage
Getting URLs through Telnet by PLahZma
Making A Phone Headset by Negative Rage
Irc Nuking in Win95 Without Trumpet Winsock by Lord Somer
Nethosting.com - Get Read/Write/Reboot/Shutdown access to the entire nethosting.com system including all 231 of its subdomains! by Lord Somer *PATCHED*
Irc Bouncing Around Klines Using a unix Shell by Lord Somer
Socket Services by Relevation
Hacking a Unix Password File by Lord Devious
Sping patches are there any?
Sping technical info
Sping Attack..What you should Know
New Guide to help Newbies Hack. Submitted/Written by IceKool
The Magic 8 Ball Trick in Microsoft Access 7
Bugs and Backdoors in IRC clients, scripts and bots
Bug in Microsoft NT IIS - Pickup the patch in the NT file area
How to defeat the Tripod Advertisement on your Webpage; Hole Discovered by JASAlot
A list of Telenet Dialups for the USA
Credit Carding Part I "The Card"
Credit Carding Part II "Getting the Cards"
Credit Carding Part III "The Dropsite"
SMB Attacks on Windows 95
Microsoft Index Server Exposes IDs and Passwords
Microsoft DNS Server is Subject to Denial of Service Attack
What you should know about Viruses
An Introduction to DOS. (Denial of Service)
Guide to mostly harmless hacking
Article by mR.dISCO on Hacking Caller ID Boxes (to get more call capacity)
Article by kM on Hacking Matt's Script "wwwboard" to delete messages and get admin id/pw
The Ultimate Begginer's Guide to Hacking and Phreaking
How To Leave A Message Anywhere For Free
Acquiring Account Information
List of Anonyomous E-mail Servers
Simple Active Attack Against TCP
Decrypts cisco "encrypted" passwords
This discusses one of many possible uses of the "FTP server bounce attack"
Hacker's Encyclopedia
Hacking via Win95's ftp
Hacking Servers: A Beginner's Guide
How to Hexedit mIRC - Flood Protection/Nuking - By Lord Somer
HOW TO CRACK, by +ORC, A TUTORIAL
iftp.txt - Implements the Bounce Attack for fakemail, newsposting, irc-bombing, rsh-poking, or anything else involving transfer of data *to* the target host
IP-spoofing Demystified
To advertise by msging,inviting, or noticing everyone on a server is pretty easy to do by Lord Somer
Simple script to supply the "privmsg " of IRC typein, and keep the connection alive by Lord Somer
Getting around klines by Lord Somer
Increasing Speed of mIRC by Lord Somer
Information on Netcat
Working out-telnets
A List Of Some OF The Most Useful UNIX Hacking Commands, and Some Hints On Their Usage
A web browser for unix
Web proxy
Hit the major search engines. Hose the [large] output to a file!
BBS Hacking Article
Article on Cracking Windows NT Passwords
Article on the Ping O' Death
Defeating the Windows 95 Screen Saver Password
HackerZ Hideout Most Commonly asked Questions and Answers
Carding for Beginners: Part I
Cracking that Unix "Passwd" File
PHF Web Hacking
Changing the Registration Name for Windows 95
Dig up hidden CD Keys
TCP/IP FAQ
Sniffer FAQ
List of Security Holes in Unix and how to look for them
DCHP FAQ
This article is intended to show you how to hold onto root once you have it
Article about CGI scripts and the Vulnerabilities of them
Internet Daemons
A Guide to Internet Security
The purpose of this paper is to explain IP-spoofing to the masses
Security holes that are resident in many versions of Sendmail
Possible ways to get a copy of the shadow file
Web Spoofing: An Internet Con Game
How to become a Unix Hacker
Acronyms and what they mean
What is an anonymous remailer?
What are some books of interest to hackers?
How to I change to directories with strange characters in them?
How do I erase my presence from the system logs?
What is ethernet sniffing?
How do I send fakemail?
What is 127.0.0.1?
How do I hack ChanOp on IRC?
What are some mailing lists of interest to hackers?
What is an Internet Outdial?
What is PGP?
How do I gain root from a suid script or program?
How do I break out of a restricted shell?
How do I access the password file under Unix?
How do I post to a moderated newsgroup?
What is a trojan/worm/virus/logic bomb?
How can I protect myself from viruses and such?
How do I access the password file under VMS?
Informational Resources - Cracking -
- -=[ Recently Added on 12-05-98 ]=-
|
Nothing New as of 12-05-98
Introduction to Win95 Cracking
How To Disassemble A Windows Program(part 1)
How To Disassemble A Windows Program(part 2)
Odin's Cracking Tutorial
Qapla's cracking tutorial, version 0.1 rel 970209
raZZia's Tutorial on Key Generators (01-97)
razzia's tutorial for vb cracking
How to undongle by +Xoanon
The flags-faking approach
TimeLOCK DLL "a cracking approach"
Softice CHAPTER 1 - Introduction
Softice CHAPTER 2 - Getting Started
Softice CHAPTER 3 - Debugging In 30 Minutes
Softice CHAPTER 4 - Using Break Point Commands
Softice CHAPTER 5 - Using Other Commands
Softice CHAPTER 6 - Soft-ICE Initialization Options
Softice CHAPTER 7 - Symbolic and Source Level Debugging
Softice CHAPTER 8 - Expanded Memory Support
Softice CHAPTER 9 - Back Trace Ranges
Softice CHAPTER 10 - Using Soft-ICE with MagicCV or MagicCVW
Softice CHAPTER 11 - Advanced Features
SoftICE Tutorial
Using Breakpoints
Informational Resources - Phreaking -
- -=[ Recently Added on 12-05-98 ]=-
|
X-box Fone Connector - Written by Langly
A Cellular Guide By: Downtime
Beware of Phreaker Scams to PBX systems
Get ca$h, from the fon company free by ChronicK
How to build and operate my DeLier Box by Psyc≡Pyr≡
A Newbies guide to Phreaking in the 90's
What do all the colored boxes do?
What is an ANAC number?
What is a Black Box?
What is a Blue Box?
What is Caller-ID?
What is a CNA number?
What are the DTMF frequencies?
What are all of the * (LASS) codes? Example: *70
What is a loop?
What is a PBX?
What is a Red Box?
What is a ringback number?
What is scanning?
What is a VMB?
Informational Resources - Pirating -
- -=[ Recently Added on 12-05-98 ]=-
|
Nothing New as of 12-05-98
Creating a Xdcc offer bot for irc by Lord Somer
FAQ for Trading For Files via IRC
Guide to Pirating on the Internet
How do I defeat Copy Protection?
Back to Menu