If you would like us to add anything to this please send it to Renegade or Jackal and it will probably be put it up. Enjoy...
The Ultimate Beginner's Guide to Hacking and Phreaking | |
How to know when you're a hacker | |
3 good tools to have |
So you want to be a harmless hacker? | |
Hacking from Windows 95 | |
Hacking into Windows 95 (and a little bit of NT lore)! | |
Hacking from Windows 3.x, 95 and NT | |
How to get a *Good* Shell Account | |
How to Get a *Good* Shell Account | |
Hacking tip of this column: how to finger a user via telnet | |
In this issue we learn how to forge email -- and how to spot forgeries. | |
How finger can be used as one of the most common ways to crack into non-public parts of an Internet host. | |
How to get Usenet spammers kicked off their ISPs. | |
How to get email spammers kicked off their ISPs. | |
How to nuke offensive web sites. | |
Internet for Dummies | |
Linux! | |
Introduction to TCP/IP | |
More intro to TCP/IP | |
How to keep from getting kicked off IRC! |
Explains the Dynamic Host Configuration Protocol | |
Ethernet FAQ | |
Novell Netware FAQ | |
Another Novell FAQ | |
A big list of ports and what runs on them(not always accurate) | |
How Kevin Mitnick was caught | |
Describes source routing, very good if you want to learn IP spoofing | |
Covers more than just TCP/IP | |
Robert T. Morris describes a flaw in the 4.2BSD TCP/IP implementation | |
A short overview of IP spoofing: PART I | |
The second part | |
IP Spoofing Demistified | |
An active attack against TCP/IP | |
Good '.pdf' files on IP addresses | |
The Art of Port Scanning by Fyodor, good article on port scanning from Phrack | |
Remote OS detection via TCP/IP Stack FingerPrinting by Fyodor, another good one | |
Port Scanning without the SYN flag by Uriel Maimon, this method was used in NMAP | |
How to defeat Intrusion Detection Systems | |
Scanning for RPC services | |
An ethernet sniffer FAQ, it's a good place to start learning about them |
Tells you where to put backdoors, but you figure out how | |
The Concience of a Hacker, as originaly printed in Phrack | |
How to get information about people | |
Improve the security of your site by breaking into it | |
How to hack callback units | |
A good social engineering FAQ | |
Explains how the Morris worm worked | |
Do not confuse this with telnet |