packets_found_bellovin.ps.gz Packets Found on an Internet Bellovin, Steven M.; 1993; Postscript A very interesting paper describing the various attacks, probes, and miscellaneous packets floating past AT&T Bell Labs' net connection.
tcpip_problems_bellovin.ps.gz Security Problems in the TCP/IP Protocol Suite Bellovin, Steven M.; 1989; Postscript A broad overview of problems within TCP/IP itself, as well as many common application layer protocols which rely on TCP/IP.
dragons_bellovin.ps.gz There Be Dragons Bellovin, Steven M.; 1992; Postscript Another Bellovin paper discussing the various attacks made on att.research.com. This paper is also the source for this page's title.
ipc_tutorial.ps.gz An Advanced 4.3BSD IPC Tutorial Berkeley CSRG; date unknown; Postscript This paper describes the IPC facilities new to 4.3BSD. It was written by the CSRG as a supplement to the manpages.
nfs_trace.txt NFS Tracing by Passive Network Monitoring Blaze, Matt; 1992; ASCII Blaze, now famous for cracking the Clipper chip while at Bell Labs, wrote this paper while he was a PhD candidate at Princeton.
packet_filt_chapman.ps.gz Network (In)Security Through IP Packet Filtering Chapman, D. Brent; 1992; Postscript Why packet filtering is a difficult to use and not always a very secure method of securing a network.
berferd_cheswick.ps.gz An Evening with Berferd Cheswick, Bill; 1991; Postscript A cracker from Norway is "lured, endured, and studied."
improving_security_sri.ps.gz Improving the Security of your Unix System Curry, David, SRI International; 1990; Postscript This is the somewhat well known SRI Report on Unix Security. It's a good solid starting place for securing a Unix box.
cops_dan_farmer.txt COPS and Robbers Farmer, Dan; 1991; ASCII This paper discusses a bit of general security and then goes into detail reguarding Unix system misconfigurations, specifically ones that COPS checks for.
improve_by_breakin.txt Improving The Security of Your System by Breaking Into It Farmer & Wietse; date unknown; ASCII An excellent text by Dan Farmer and Wietse Venema. If you haven't read this before, here's your opportunity.
tcp_attack.ps.gz A Simple Active Attack Against TCP Joncheray, Laurent; 1995; Postscript This paper describes an active attack against TCP which allows re-direction (hijacking) of the TCP stream.
passwords_klein.ps.gz Foiling the Cracker Klein, Daniel; Postscript A Survey of, and Improvements to, Password Security. Basically a treatise on how to select proper passwords.
bsd_tcpip_weakness_morris.ps.gz A Weakness in the 4.2BSD Unix TCP/IP Software Morris, Robert T; 1985; Postscript This paper describes the much ballyhooed method by which one may forge packets a stink about it!
key_study.txt The Risks of Key Recovery, Key Escrow, and Trusted 3rd Party Encryption Various Authors; May 1996; ASCII This paper examines the technical risks, costs, and implications of deploying systems that provide government access to encryption keys.
firewalls_ranum.ps.gz Thinking About Firewalls Ranum, Marcus; Postscript A general overview of firewalls, with tips on how to select one to meet your needs.
ALT2600.TXT ALT2600.txt Voyager; 1995; ASCII This is the FAQ from the internet news group Alt.2600. Deals with various topics concerning hacking and phreaking.
Hackers-Handbook The Hacker's Handbook Cornwall, Hugo; 1985; ASCII A book about hacking techniques, hacking intelligence, Networks, etc.
X.security Crash Course in X-Windows Security Unknown Author; Unknown Date; ASCII This document will help you learn about X-Windows Security and how to make it more secure.
bump.txt Things that go Bump on the net Unknown Author; Unknown Date; ASCII This is a brief look at some of the more colorful characters in the menagerie of network security threats, with an emphasis on how they relate to agent-based sytems.
X.security Securing X Windows Fisher, John; 1995; ASCII This document talks about how X-windows works, Host Authenticiation and Token Authenticiation, Xterm Vulnerablities and related security information.
phrack48-51.tar.gz Phrack Issues 48, 49, 50, and 51 Various Authors; Unknown Date; ASCII This discusses various hacking/security topics and includes sample source code.
Unixhack.txt A Unix Hacking Tutorial Sir Hackalot; Unknown date; ASCII A Excellent hacking tutorial for the starting hacker or hacker-wanna-be.
satan-1.1.1.tar.gz Satan-1.1.1 with documentation Dan Farmer & Wietse Venema; March 1995; Various Formats. SATAN (Security Administrator Tool for Analyzing Networks) remotely probes systems and stores the results in a database.
hacking_guide.txt The Neophyte's Guide to Hacking Deicide; August 1993; ASCII Another guide for beginning hackers that talks about a wide range of topics.
hackkit-2.0b.txt Hacking Kit version 2.0 Beta Invisible Evil; March 1997;ASCII A very detailed and well written guide for hackers. This document is also fairly up to date and includes examples and source code.
iphijack.ps IP Hijacking CERT Advisory Team; Unknown Date; Postscript This paper discuesses the art of IP hijacking.
list-archives.tar.gz Linux security archives by date Various Authors; March 1995 through October 1996; ASCII The Linux Security list-archives from March 1995 through October 1996.
socket_faq.tar.gz Sockets Frequently Asked Questions Vic Metcalfe; August 1996; ASCII (tarred and zipped) Socket Frequently Asked Questions includes many examples and source code.
crh.tar.gz Confidence Remains High Issues 1-6 + Summer Issue Various Authors; Various Dates; ASCII (tarred and zipped) An excellent magazine discussing hacking, phone, radio, and more.
cifs.txt Common Insecurities Fail Scrutiny *Hobbit*; January 1997 ; ASCII An analysis of TCP/IP NetBIOS file-sharing protocols is presented as well as the examination of protocol and administrative vulnerabilities.
firewall_docs.tar.gz Firewall Papers and Performance Issues Various Authors; April 1997 ; Various Formats This is a small collection of Papers and source concerning firewalls and their performace.
linux-stack-overflow.tar.gz Linux Stack OverFlows Willy Tarreau; June 1997 ; HTML An HTML page with sample utilities describing stack overruns on Linux.
hacking_unix.txt Hacking Unix Systems Red Knight; October 1989 ; ASCII An Indepth Guide to Hacking UNIX and the Concept of Basic Networking.
sequence_attacks.txt Sequence Number Attacks Rik Farrow; December 1994 ; ASCII A brief article that gives an overview of TCP sequence number attacks. (Includes rfc1948 which shows how to protecte against TCP sequence no. attacks.
buffer_overwrites.tar.gz Buffer OverWrites Various Authors; June 1997 ; Various Formats A collection of papers and utilities concerning the art of buffer overwriting.
hedrick-intro.txt Introduction to Internet Protocols Charles L. Hedrick; July 1987; ASCII An introduction to the Internet networking protocols (TCP/IP).
novice_hacking.txt A Novice's Guide to Hacking The Mentor; December 1988; ASCII Another good source of reading for beginners.
backdoors.txt Backdoors Christopher Klaus; August 1997; ASCII A discussion of many common backdoors and ways to check for them.
them_and_us.txt Them and Us Paul Taylor; June 1997; ASCII Chapter 6 of Paul Taylor's Hacker Book which talks about some of the ethics and boundaries of hacking.
gateway.ps.Z The Design of a Secure Internet Gateway Bill Cheswick; Unknown Date; Postscript This paper describes an internet gateway configuration that helps protect the internal network even if an external machine is compromised.
ftp-paper.txt Some Problems with the FTP Protocol David Sacerdote; April 1996; ASCII Discusses problems with the File Transfer Protocol, a failure of common implementations, and suggestions for repair.
unix_bible.zip Psychotic's Unix Bible Virtual Circuit; Unknown Date; Zipped An excellent Unix resource to have. The Unix Bible contains and illustrates many Unix commands and their syntaxes.
ssh-x11.ps.gz The interaction of SSH and X11 Ulrich Flegel; September 1997; Postscript Thoughts concerning the security of SSH in conjunction with X11.
beginners_guide.txt Beginners Guide to Hacking Phantom; October 1997; ASCII An excellent guide with examples and text discussing getting access, hacking root, covering tracks, and much more.