home *** CD-ROM | disk | FTP | other *** search
File List | 2003-06-11 | 12.7 KB | 243 lines |
- ACC_MAIL.ZIP Access the Internet via Mail! FTP, Gopher, Usenet, etc through mail
- AIPART1.FAQ Anonymity On the Internet Part 1
- AIPART2.FAQ Anonymity On the Internet Part 2
- AIPART3.FAQ Anonymity On the Internet Part 3
- AIPART4.FAQ Anonymity On the Internet Part 4
- ALTGROUP.TXT Creating a new "alt" newsgroup
- ALTIRC.FAQ Frequently Asked Questions about Alt.IRC
- ANONFTP.DOC A list of Internet sites accepting anonymous FTP
- ANONFTP.HOW Setting up a secure anonymous FTP site!
- ANONIRC.C Anonymous IRC in C
- ARCHIE.MAN Archie MAN page
- ARCHIE_M.ZIP Info about Archie
- ARCHMAIL.ZIP How to search Archie servers through Email
- BANNED.FAQ How to receive banned newsgroups F.A.Q.
- BEWM2.C Sends spoofed ICMP Packets
- BGRBIX.ZIP BIX -> Internet Account
- BILLBORD.TXT Electronic Billboards on the Information Superhighway
- BIN.ZIP Handling Binaries on the net
- BIND.EXP Stealing packets with bind()
- BIND96.TXT SNI Security Advisory - Vulnerability in Unchecked DNS data (96/11/18)
- BITFTP.ZIP Princetons Bitnet FTP Server
- BMB2.C Floods a port with a string
- BOTS.ZIP Info on writing a Bot for IRC
- BOUNCE.C A Telnet Bouncer. C Source
- BROWSRHK.TXT Hacking with Netscape
- CANCEL.C "Purify" is a Usenet cancelbot distributed free in C source. Don't use it, it's evil. Really.
- CHECKLOG.ZIP Check if yer still logged in and if so kill ya.. unix
- CYBERP.ZIP The FAQ to alt.cyberpunk.* Usenet Newsgroups
- CYBERSIT.TXT A plaintext control file for Cybersitter
- CYBRPROM.TXT Ever want to hassle Cyber Promo? Now you can with this list!
- DATAPIPE.C Create listen sockets (1995)
- DENIAL.TXT Introduction to Denial of Service
- DISEMAIL.TXT How to send disguised (forged) E-Mail
- DNS_DOS.TXT Microsoft DNS Server subject to DoS attack
- DOMAIN.HAC Domain Hijacking, InterNIC loopholes
- DOMAINS.TXT Contacts for each domain, by level
- DOMAIN_I.TXT Domains registered with the NIC
- DOMAIN_T.TXT Questionnaire for domain registration
- DOS101.TXT Introduction to DoS (Denial of Service)
- DOSATACK.C Opens many dangling TCP connections - a Denial of Service attack
- DUMMY20.TXT The Big Dummies Guide to Internet
- EACCESS.TXT Accessing the Internet by Email - March 1997
- ECHOK.C Sends spoofed ICMP Packets
- ELECTROP.TXT Electropolis: Communication and Community on Internet Relay Chat (
- EMAILADR.FAQ How to find someone's E-Mail address
- EPROBE.C Spoofing SYN Flooder
- EPROBE2.C Spoofing SYN Flooder (modified)
- ERECT.C Irc name server spoof.
- ES.C Monitor (sniff) TCP/IP packets
- ESNIFF.C C source for a packet sniffer
- FAKEMAI2.TXT Fake E-mail -- How you can send it through your own shell, no need to use anyone elses stuff!
- FAKEMAIL.FAQ Fake Mail FAQ 0.2
- FAKEMAIL.HOW How to send Fakemail
- FAKEMAIL.TXT How to send fakemail, by Doc Rain
- FEPROBE.C Spoofing SYN Flooder (modified again)
- FIREWALL.FAQ Internet Firewalls Frequently Asked Questions
- FORGENWS.TXT Better Living through (news) forgery
- FTP.DOC USENET FTP introduction
- FTPBOUNC.TXT The FTP Bounce Attack
- FTPHACK.TXT Breaking into Macs with the little-known NCSA Telnet FTP host
- FTPINTRO.TXT Internet FTP Intro
- FYI_IDX.TXT Index to FYI documents. FYIs are also RFCs
- GATEWAY.DOC The DECWRL mail gateway - apparently meant for DEC employees
- HACKFTP.TXT FTP Hack
- HACKGEO2.TXT Hacking Geocities Homepages ver.2
- HACKPAGE.TXT Hacking Webpages - The Ultimate Guide
- HACKTCP.TXT Simple Active Attack against TCP
- HACKWWW.TXT How to hack the WWWBoard Message Board 2.0
- HACK_CYB.ZIP A file which explains how to get a free validated account on the internet site cyberspace.com
- HADMINBY.TXT Host Admins. by host net address
- HEXEDIT.TXT How to Hex edit mIRC - flood protection, nuking
- HOSTS.TXT Official Defense DataNet Internet Host Table
- HOSTSERV.TXT How to use NIC hostname server
- HOST_LOC.TXT Host Info sorted geographically
- HPAV.TXT HPAV list of FTP Sites
- INETAD.DPD Advertising and Promoting on the Internet by Daniel P. Dern
- INTCENS1.TXT Getting Around Usenet Censors 1/6
- INTCENS2.TXT Getting Around Usenet Censors 2/6
- INTCENS3.TXT Getting Around Usenet Censors 3/6
- INTCENS4.TXT Getting Around Usenet Censors 4/6
- INTCENS5.TXT Getting Around Usenet Censors 5/6
- INTCENS6.TXT Getting Around Usenet Censors 6/6
- INTERNET.ASC InterNet
- INTERNET.DOC Beginners Guide to Internet
- INTERNET.HAC A Hacker's Guide to the Internet by The gatsby
- INTERNET.TXT How to request an internet number
- INTERNET.UVI Internet Via UVic (an old local file I lost a long time ago - reappeared on The Hacker Chronicles ][!)
- IPADDR.TXT IP Addressing -- How IP addressing works, came to be, and it's weeknesses.
- IPBOMB.C IP Flooder
- IPHIJACK.TXT Packet Hijacking -- Another one on packet sniffing and getting things you're not supposed to have....
- IPHOOK1.TXT Hook Pc to Internet Part 1
- IPHOOK2.TXT Hook Pc to Internet Part 2
- IPSPOOF.C C source for a packet forger / IP spoofer
- IPSPOOF.TXT IP Spoofing Demystified
- IRC.FAQ IRC (Internet Relay Chat) FAQ
- IRC.TXT Hacking IRC client to hide real name
- IRC2.TXT IRC keepalive
- IRCPRIMR.TXT The IRC Primer
- IRCSEQ28.C IRC sequencer
- IRC_ADV.TXT Advertising on IRC is pretty easy to do.
- IRC_BACK.FAQ Bugs and backdoors in IRC clients, scripts and bots.
- ISOCOUNT.TXT ISO Country Codes
- I_PHONE.FAQ FAQ: How Can I use the Internet as a Telephone?
- JOLT.C Windows killer.
- KA9Q.ZIP Info on Packet Filtering
- KEEPUP30.TXT FTP Keepup 3.0
- KILLFILE.FAQ Frequently Asked Questions about Killfiles
- KLINES.TXT Getting around klines in IRC
- LEGION.C IRC sequencer
- LYNXMSIE.TXT Port 19 -- A text on ways to use Port 19 to crash MSIE, Lynx etc.
- MIRCSPD.TXT Increasing the speed of mIRC
- MISCFTP.FAQ Anonymous FTP Frequently Asked Questions
- MUD_1.FAQ Basic Information About MUDs and Mudding FAQ, Part 1 of 3 (03/1995)
- MUD_2.FAQ Basic Information About MUDs and Mudding FAQ, Part 2 of 3 (03/1995)
- MUD_3.FAQ Basic Information About MUDs and Mudding FAQ, Part 3 of 3 (03/1995)
- MUD_MISC.ZIP Misc info about MUDs
- NEWSREAD.J95 How the Usenet Readership Report is generated, Jan 1995
- NEWS_MON.TXT Can your newsgroup activity be monitored?
- NITWIT.C Monitor (sniff) TCP/IP packets
- NUG.DOC DDN New User Guide, ASCII version
- OCTOPUS.C A *good* port bomber
- PEPSI.C Spoofing UDP Flooder
- PINGODTH.TXT Large Packet Attacks (aka the Ping of Death)
- POWER.PST Usenet Power Posting School
- PPP_1.FAQ [1/8] PPP Frequently Asked Questions: Letter From the Editor
- PPP_2.FAQ [2/8] PPP Frequently ASked Questions: What is PPP?
- PPP_3.FAQ [3/8] PPP Frequently Asked Questions: How to (Configuration Recipies)
- PPP_4.FAQ [4/8] PPP Frequently Asked Questions: Misc. PPP Q&A
- PPP_5.FAQ [5/8] PPP Frequently Asked Questions: Free PPP Software Packages
- PPP_6.FAQ [6/8] PPP Frequently Asked Questions: How to get more PPP information
- PPP_7.FAQ [7/8] PPP Frequently ASked Questions: Commercial PPP Software Packages
- PPP_8.FAQ [8/8] PPP Frequently Asked Questions: PPP Hardware
- PRIV5.TXT Identity, Privacy and Anonymity on the Internet
- PRIVATIZ.ZIP A suggestion to privatize Internet
- PSI_INFO.ZIP Internet access (SLIP info)
- PUBSERV.NWS A long list of public NNTP servers!
- QUENCH.C ICMP_UNREACH Spoofer (kinda sucks)
- REMAIL.10 This is the 10 second remailer package. The idea is from
- REMINSTR.TXT Instructions for using anonymous remailers on the Internet. Many use PGP
- RFC1459.TXT Internet Relay Chat Protocol
- RST2.C Spoofing RST flooder
- RST3.C Spoofing RST flooder (modded)
- SEC_FTP.FAQ Setting up a Secure FTP Site
- SENDMAI1.TXT Sendmail config. documentation
- SENDMAI2.TXT Sendmail for hosts using Internet and UUCP
- SENDMAI3.TXT Sendmail for Internet-only hosts
- SLIPDOC.TXT Personal Internet Access using SLIP or PPP: How You Use It, How It Works
- SMBWIN95.TXT SMB attacks on Windows 95
- SNIFFER.TXT FAQ on Sniffers (v1.7)
- SOCDMINI.C C source - binds a shell to a socket - default port 31337
- SOCKET.TXT Socket Services
- SOLSNIFF.C Monitor (sniff) TCP/IP packets
- SPAMFAQ.TXT Spam FAQ
- SPAMLIBS.TXT Spamlibs - Bulk Email draws ingenious offensives from the "masses"
- SPING.TXT The Sping Attack... what you should know
- SPING2.TXT Ssping/Jolt Technical Info
- SPINGPTC.TXT Ssping/Jolt Patches
- SPONSOR_.INF Explanation of network sponsorship
- SPOOFING.TXT Web Spoofing: an Internet Con Game
- SSLFAQ.103 Secure Sockets Layer FAQ 1.0.3
- SUNSNIFF.C Monitor (sniff) TCP/IP packets
- TACNET.FAQ Tactical Net Abuse FAQ 1.2
- TCPMON.C Monitor (sniff) TCP/IP packets
- TCPSPOOF.TXT SNI Security Advisory - A Simple TCP spoofing attack 97/02/10
- TCP_IP.DOC Overview of the TCP/IP protocols (INet)
- TCP_IP.FAQ TCP-IP FAQ
- TCP_IP.TXT TCP/IP FAQ
- TELBOUNC.C C source for a telnet bouncer
- TEL_FAQ.TXT NCSA PC Telnet FAQ
- TEST.HTM Basic HTML commands list
- TRICKLE.DOC Trickle Server Help
- TRIPODHK.TXT How to defeat the ad in your Tripod homepage
- TUTORIAL.ZIP An IRC Tutorial
- UNIXBBS.FAQ Unix BBS Software FAQ
- USEFAQ.TXT FAQ on Usenet
- USEREAD.REP Usenet Readership Report for March 1995
- US_DOMAI.TXT Explanation of the US domain
- UUCP.FAQ UUCP Inside & Out
- VAS039.TXT VAS #39: Listserv Revised
- VENDORS1.DOC TCP/IP Vendors Guide, online ver
- VENDORS2.DOC Template for TCP/IP implementors
- WEB.TXT Web Hacking
- WEBPROXY.TXT Web Proxy
- WEBSEARC.TXT Hit the major search engines, hose the [large] output to a file
- WEBWAR.TXT PR Firm declares war on "Rogue" web sites (like the "Kmart Sucks" site)
- WHAT_THE.TXT Description of Network Info. Ctr
- WHOIS_IN.TXT For sys.mgrs explaining NIC WHOIS/NICNAME
- WHOLEGUI.TXT The Whole Guide to Internet
- WHO_DDN.TXT Names, phones, mailboxes for DDN PMO
- WIN95.HAK Hacking in Windows 95 - 1.0 by Phluck
- WINNUKE.C Windows Killer
- WWWBOARD.TXT Hacking a WWWBoard
- X25.DOC DDN X.25 Host Interface Spec. (103241)
- ZEN10.TXT Gutenburg's Zen and the Art of Internet
- LINUXSNF.C Monitor (sniff) TCP/IP packets
- PORTS.ZIP Common Ports
- HANDBOOK.ZIP Hacking Webpages The Ultimate Guide
- IPSNCODE.TXT An IP Spoofing and Sequence Number Exploiting Program (C Src)
- JAVAINSE.TXT Java Security Problems
- HOTMAIL.TXT Hotmail Hacking Info
- ICQ_BOMB.TXT Turning your mail bomber into an ICQ Pager Bomber
- ANGELFIR.TXT Hacking Angelfire Accounts (actually it's social engineering)
- SINNER1.TXT Hacking /etc/passwd in FTP sites is lame, but SIN doesn't think so.
- MBI7.TXT Highly Searched Keywords on WWW Search Engines
- WRATHING.TXT "Wrathing" a Web Page by Archangel (1998)
- HACK-AVS.TXT Harvesting AVS (Adult Verification Service) Passes
- by The Fixer, March 1998
- ATCKTHRD.JAV This Java Applet is intended to spew forth huge non-functioning
- black windows and obliterate the screen in order to exclude the
- user from the console. It also features a terribly annoying sound
- that won't stop until you do something drastic.
- JAVABUG.TXT NASIRC BULLETIN B-96-24 June 10, 1996
- JAVA Class Loader Hole Recently Discovered
- CONSUME.JAV This Java Applet is intended to bring your Java-aware
- browser to its knees by hogging both the CPU and memory.
- DOMYWORK.JAV This Java applet makes you try to factor a moderately long integer
- by trial division, and it reports the reults back to it's home.
- Clearly the same could be done for many, many other sorts of
- calculations. While it performs no hostile actions per se, it does
- put your workstation to work for somebody else, perhaps a business
- competitor or someone trying to crack codes. To create an applet
- that does other sorts of work, you can replace the class GetFactor
- with another working class and adjust the classes Report and
- ReportServerSocket accordingly.
- DTROUBLE.JAV This Java Applet is intended to spew forth huge non-functioning yellow
- and black windows and obliterate the screen in order to exclude the
- user from the console.
- ERRMSG.JAV These classes produce a very large untrusted applet window which tries
- to hide its lack of security. One frame within this window
- contains a bogus message about your system's security and requests
- that you login in order to run the browser in a "secure mode."
- Any login information that you enter is communicated back to the
- server whence the applet came, and in any case this ungrateful
- applet then proceeds to attack you.
- RCMPIT45.TXT RCMP IT Security Bulletin #45
- 50ATTACK.TXT 50 Attacks on Netscape
- CGI-EX_1.TXT CGI Security: Escape Newlines
- COMPRO~1.TXT Compromise FAQ
- IPADDRES.TXT Eliminating IP Address Forgery
- SYNFLOOD.HOW How a SYN Flood works
- FREEINET.TXT Gaining free Internet access in the U.K.
- CG96HACK.ZIP The Clinton-Gore 96 Hacked Webpage!
-