If you would like us to add anything to this please send it to Renegade or Jackal and it will probably be put it up. Enjoy...
| The Ultimate Beginner's Guide to Hacking and Phreaking | |
| How to know when you're a hacker | |
| 3 good tools to have |
| So you want to be a harmless hacker? | |
| Hacking from Windows 95 | |
| Hacking into Windows 95 (and a little bit of NT lore)! | |
| Hacking from Windows 3.x, 95 and NT | |
| How to get a *Good* Shell Account | |
| How to Get a *Good* Shell Account | |
| Hacking tip of this column: how to finger a user via telnet | |
| In this issue we learn how to forge email -- and how to spot forgeries. | |
| How finger can be used as one of the most common ways to crack into non-public parts of an Internet host. | |
| How to get Usenet spammers kicked off their ISPs. | |
| How to get email spammers kicked off their ISPs. | |
| How to nuke offensive web sites. | |
| Internet for Dummies | |
| Linux! | |
| Introduction to TCP/IP | |
| More intro to TCP/IP | |
| How to keep from getting kicked off IRC! |
| Explains the Dynamic Host Configuration Protocol | |
| Ethernet FAQ | |
| Novell Netware FAQ | |
| Another Novell FAQ | |
| A big list of ports and what runs on them(not always accurate) | |
| How Kevin Mitnick was caught | |
| Describes source routing, very good if you want to learn IP spoofing | |
| Covers more than just TCP/IP | |
| Robert T. Morris describes a flaw in the 4.2BSD TCP/IP implementation | |
| A short overview of IP spoofing: PART I | |
| The second part | |
| IP Spoofing Demistified | |
| An active attack against TCP/IP | |
| Good '.pdf' files on IP addresses | |
| The Art of Port Scanning by Fyodor, good article on port scanning from Phrack | |
| Remote OS detection via TCP/IP Stack FingerPrinting by Fyodor, another good one | |
| Port Scanning without the SYN flag by Uriel Maimon, this method was used in NMAP | |
| How to defeat Intrusion Detection Systems | |
| Scanning for RPC services | |
| An ethernet sniffer FAQ, it's a good place to start learning about them |
| Tells you where to put backdoors, but you figure out how | |
| The Concience of a Hacker, as originaly printed in Phrack | |
| How to get information about people | |
| Improve the security of your site by breaking into it | |
| How to hack callback units | |
| A good social engineering FAQ | |
| Explains how the Morris worm worked | |
| Do not confuse this with telnet |