Contents:
Chapter I - Unix commands you need to know
1A. Basic commands
1B. Telnet
1C. Rlogin
1D. FTP
1E. GCC (unix compiler)
Chapter II - Getting started (your first account)
2A. Cracking password
files
2B. Talking to newbe's
2C. The hard way
2D. Using mount to gain access to unix systems
Chapter III - Getting password files
3A. PHF
3B. Newbe's
3C. Getting shadow passwd files
3D. Getting /etc/hosts
Chapter IV - Getting the root account
4A. Bugs
4B. Exploits
Chapter V - Making yourself invisible
5A. Zap2 (for
wtmp/lastlog/utmp)
5B. Other scripts
Chapter VI - Cleaning the log files
6A. A walk around in a hacked
system - let's login
6B. messages and the syslog
6C. The xferlog
6D. The crontabs
Chapter VII - Keeping access to the machine
7A. Tricks of the trade
7B. Root kits and trojans
Appendix I - Things to do after access
Appendix II - Hacking / Security WWW / ftp sites
Appendix V - Other Unix Exploits
กก