When I picture a perfect reader, I always picture a
monster o fcourage and curiosity, also something
supple, cunning, cautious, a born adventurer and
discoverer...

--Friedreich Nietzsche

If you would like us to add anything to this please send it to Renegade or Jackal and it will probably be put it up. Enjoy...

Newbies
starthak.txt
The Ultimate Beginner's Guide to Hacking and Phreaking
know.txt
How to know when you're a hacker
unixtools.txt
3 good tools to have


Guide to Mostly Harmless Hacking
gtmbeg.txt
So you want to be a harmless hacker?
gtmbeg2a.txt
Hacking from Windows 95
gtmbeg2b.txt
Hacking into Windows 95 (and a little bit of NT lore)!
gtmbeg2c.txt
Hacking from Windows 3.x, 95 and NT
gtmbeg3a.txt
How to get a *Good* Shell Account
gtmbeg3b.txt
How to Get a *Good* Shell Account
gtmhh1-1.txt
Hacking tip of this column: how to finger a user via telnet
gtmhh1-2.txt
In this issue we learn how to forge email -- and how to spot forgeries.
gtmhh1-3.txt
How finger can be used as one of the most common ways to crack into non-public parts of an Internet host.
gtmhh1-4.txt
How to get Usenet spammers kicked off their ISPs.
gtmhh1-5.txt
How to get email spammers kicked off their ISPs.
gtmhh1-6.txt
How to nuke offensive web sites.
gtmhh2-1.txt
Internet for Dummies
gtmhh2-2.txt
Linux!
gtmhh2-3.txt
Introduction to TCP/IP
gtmhh2-4.txt
More intro to TCP/IP
gtmhh3-3.txt
How to keep from getting kicked off IRC!


Internet technology
dhcp-faq.txt
Explains the Dynamic Host Configuration Protocol
etherfaq.txt
Ethernet FAQ
novell-faq.txt
Novell Netware FAQ
novell-faq2.txt
Another Novell FAQ
portlist.txt
A big list of ports and what runs on them(not always accurate)
shimomur.txt
How Kevin Mitnick was caught
src_route.txt
Describes source routing, very good if you want to learn IP spoofing
tcpipfaq.txt
Covers more than just TCP/IP
tcpipweak.txt
Robert T. Morris describes a flaw in the 4.2BSD TCP/IP implementation
ip-spoof1.txt
A short overview of IP spoofing: PART I
ip-spoof2.txt
The second part
ip-spoof3.txt
IP Spoofing Demistified
iphijack.txt
An active attack against TCP/IP
iptutorial.zip
Good '.pdf' files on IP addresses
fyodor1.txt
The Art of Port Scanning by Fyodor, good article on port scanning from Phrack
fyodor2.txt
Remote OS detection via TCP/IP Stack FingerPrinting by Fyodor, another good one
umaimon.txt
Port Scanning without the SYN flag by Uriel Maimon, this method was used in NMAP
deafeatisd.txt
How to defeat Intrusion Detection Systems
scanrpc.txt
Scanning for RPC services
sniffer.txt
An ethernet sniffer FAQ, it's a good place to start learning about them


Misc.
backdoor.txt
Tells you where to put backdoors, but you figure out how
hakmanif.txt
The Concience of a Hacker, as originaly printed in Phrack
getinfo.txt
How to get information about people
improvesec.txt
Improve the security of your site by breaking into it
hakcallback.txt
How to hack callback units
social.txt
A good social engineering FAQ
worm.txt
Explains how the Morris worm worked
telenet.txt
Do not confuse this with telnet


[Ethics] [Texts] [Exploits] [Programs] [Links] [E-mail Jackal] [E-mail Renegade] [Home]