hackers Search

Saturday, July 2, 2011

ethical hacking introduction


Whenever term hacker comes before many people consider it as a guy sitting inside a room or garage with a bottle or beer and a Laptop or Desktop doing wonders on click of buttons. But the reality check is hacking is not that easy as portrayed in movies and television and term hacker doesn't mean a computer criminal.

So here first of all we'll clear all our misconceptions related to words hackers and hacking.


From Where This Word Came:


The word hacking has history in late 1960's, the time when computers were nothing but mighty pieces of machines and a computer just meant a machine that can compute. Electrical and Electronics geeks used to optimize circuits to make any system/circuit work faster, better and reliably. The job they used to do on circuits was known as hack. With time computer geeks also started finding way out to optimize their system to work better so in fact hacking was nothing but always a kind of reverse engineering. With time in professional world a word hacker got meaning, a person who is highly skilled in hardware, software and networking components. Then movies started portraying hackers do only dirty works and hence today the word hacker has a negative face according to people. No matter how the word met to a dreadful end a hacker always had all qualities that was first put forward in its definition may the be criminal or ethical. Criminal hackers are also known as Crackers.


Types Of Hackers:


White Hats: White hat hackers are good guys who use their hacking skills for defensive purposes. Organizations and industries pay them high salaries to protect their systems and networks from intrusion.


Black Hats: Black hats are actually bad guys in filed. Their main job is to breach security and make money. They make money by using their hacking skills for offensive purposes.


Grey Hats: Gray hats are hackers who work for offensive and defensive purposes depending on situations. They are hired by people to intrude and protect systems.


Hactivist: A hacktivist is kinda hacker who thinks hacking can bring out some social changes and hacks government and organizations to show his discomfort over some trivial issues.


Suicide Hackers: Suicide hackers are those who hack for some purpose and even don't bother to suffer long term jail due to their activities. They can be bad as well as good.


Script Kiddie: A script kiddie is a person who boasts breaking system using scripts and codes written by others though he hardly knows what the code does.


Phreak: It is a person who tries to intrude systems for fun or malicious personal activities. Mostly they are children of age 12-15 who don't even know wrong consequences of hacking.


Types Of Hacking:


Local Hacking: This type of hacking is done when a hacker has full access to the system to implant a virus, keylogger and RATs


Remote Hacking: Remote hacking is done on a remote system using Internet.


Social Engineering: Social Engineering is kinda interacting skill that a hacker uses to manipulate people giving out sensitive information. Its kinda trick done using good verbal, social skills and understanding.


Terminologies Used Under Hacking:


Threat: A threat is an environment or situation that could lead to a potential breach of security. Ethical hackers look for and prioritize threats when performing a security analysis.


An Exploit: An exploit is a piece of software that takes advantage of a bug, glitch, or vulnerability, leading to unauthorized access, privilege escalation, or denial of service on a computer system.
Vulnerability: A vulnerability is an existence of a software flaw, logic design, or implementation error that can lead to an unexpected and undesirable event executing bad or damaging instructions to the system. In easy word vulnerability is weakness in system.


Payload: Payload is agent that helps in taking advantage of vulnerability in remote hacking.


Attack: An attack occurs when a system is compromised based on a vulnerability.



Types Of Attack:


1.Operating System Attack
2.Application level Attack
3.Shrink Wrap Code Attack
4.Misconfiguration Attack


Operating system attack is attack done on specific type of OS. Such attack is done using flaws in programs and services shipped with OS. Application level attack is done over faulty coding practices done over software during its development. Shrink Wrap Code attack are attacks done over UN-refined scripts used for making task simpler. Last is misconfiguration attack, it is kinda attack which is done over mis-configured system or a system with default settings.




Work Of An Ethical Hacker:
Job of an ethical hacker is to use all his skills and tools used by malicious hackers to find vulnerabilities in system and then provide it security against those vulnerabilities.


Conclusion: At last what I want to tell, nothing happens in clicks of buttons. A hacker is highly skilled person in field of computing who usually have ample knowledge about software, hardware, OS, networking and programming. A hacker may it be criminal or ethical has immense patience, determination, organization, discipline and persistence. An attacker may spend months of time planning, analyzing and executing an attack. This shows his level of dedication to achieve whatever goal he/she has set. A person can never become a good hacker unless he have all above qualities.


Note: Now onwards we will cover hacking as our main stream topic on this blog. Real hacking is never done over lamers who hardly knows about security, it is done over a person who is highly skilled as you are. You can never learn hacking until you do some practical and gain knowledge about field so now onwards I urge you to perform practicals that will be now posted on this blog on your own system. Next no tutorial will be taken as a lamer so they will be in possible higher details, so this may happen that you may not understand something. Rather than keeping yourself mum I plea you to please ask whenever you encounter a problem or get bothered by topic. Whenever I 'll post on hacking I 'll try to keep a theoretical and one practical tutorial, you are requested to read both and grasp matter completely.

HACKING TXT FILES



22.txt
DDN Management Bulletin 22: Domain Names Transition (March 16, 1984)

23things.txt


2600-9-3.txt
2600 Magazine Autumn, 1992 (OCR'd Issue by Anonymous)

2600_ind
2600 Subject Index Volumes 1 (1984) - 10 (1993) by David Price

2600faq.011
Beta .011 of the alt.2600/#hack FAQ by Will Spencer (March 19, 1995)

386i.txt
CIAC Advisory Notice: Authentication bypass in Sun 386i machines

5600.txt
Someone Screws Around with a Premier Telecom Products, inc. (February 4, 1990)

aahack.txt
Anarchy Anonymous: Hacking your School Network

accesblt.hac
Advanced Authentication Technology, 1991

accessin.txt
A Brief Tutorial on How to Beat the High Cost of Genie by TIC INC (November 27, 1987)

acro01.txt
Max Headroom's Hacker Acronym List

acro02.txt
Max Headroom's Second Collection of Acronyms

acrolist.phk
Acronym List, Early 1990s

acroynym.txt
The Hacker's Acronym Chart, by the International information Retreival Guild (IIRC) (November 3, 1990)

adssys.txt
A Guide to ADS Systems: Part I: Basics by Lord Digital and the Phantom

aio.box
All in One Box, by Disk Doctor

aio5b.txt
AIO 5.0b Documentation by Peter King (January 11, 1987) (Access Code Finder)

ais.txt
AIS: The Automatic Intercept System by Computer Consoles Incorporated

aix.fun
Warning to download some AIX Patches

allnet01.txt
Hacking Allnet by Shadow Warrior (January 1988)

amhack.txt
Hacking Answering Machines 1990 by Predat0r of Blitzkrieg BBS

ansibomb.txt
ANSI Bombs II: Tips and Techniques, by The Raging Golem

aohell.phk
Why I wrote AOLHell

aoim.txt
The Risks of Using an AOL Client Behind a Firewall

aolhak.txt
How to Hack America on Line by the Hooded Bobs

as400cmd.hac
IBM AS/400 Command Summary

as400cmd.txt
All IBM AS/400 Commands by The Might

aspen.txt
A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992)

aspen1.txt
A Complete Guide to Hacking and Use of ASpEN Voice Mail Systems by Caveman (January 13, 1992)

aspen2.txt
A Complete Guide To Hacking and Use of ASpEN Voice Mail Systems Part II by Caveman (March 27, 1992)

assolink.txt
An Overview of the Maine Business AssoLINK System by Kingpin of LoST/RL (1990)

at&arebl.txt
Rebel, as Hackers, against the reduction of the AT&T 60% Discount on Nights and Weekends

atlas.txt
Hackers' Atlas, by Ragon/Wynvern/BOF

atm-92.txt
ATMS: The Real File for ATM Theft in 1992 by The Raven

atm-more.txt
A Whole Collection of the Risks of ATM Cards (1988)

atm.txt
Hacking ATM's by Blue Thunder

atm1.txt
The Disk Jockey Presents Scamming ATMs

atma.hac
Quick OVerview of ATM Security (Needs Editing)

atmapps.txt
"Gee Whiz" ATM Applications are On the Horizon

atmfile
ATM secret codes, from Fred Gindburg (July 10, 1987)

atmhacking.txt
Hacking ATMs, by Anonymous

atms
An Overview of ATMs and Information on the Encoding System

atms.txt
Track Layouts on ATM Cards

auditool.txt
Intrusion Detection in Computers by Victor H. Marshall (January 29, 1991)

austhack.hac
Australian Dialups

austpac0.txt
Accessing Telecom Australia's AUSTPAC Service by Soft Beard 1990

austpac1.txt
Additional AUSTPAC Character Terminal Manual

austpac2.txt
AUSTPAC General Information and Codes

austpac3.txt
The AUSTPAC Price List by Apple Odessa an Negative Energy (September 1989)

autohack.txt
Autohack Documentation Version 1.0 by Grimalkin (August 12, 1986)

autonet1.txt
Hacker Supreme's Hackers Dictionary Volume #34 (1986) by Ninja Squirrel and Logan 5

autotelldoc.ana
Fun with Automatic Tellers

autovon1.hac
Introduction to the Automated Voice Network (Autovon) by Shadowrunner

autovon2.hac
Introduction to the Automated Voice Network (Autovon) Part II

autovon3.hac
Introduction to the Automated Voice Network (Autovon) Part III

autovoni.nst
Overview of the Automatic Voice Network (Autovon)

avoidcap.txt
Planning Ahead for Phone Phreaks/Hackers

babyna.mes
The Moby Words Database (List of Words) (1989)

backdoor.txt
How to Hold Onto UNIX Root Once You Have It

bankhack.txt
The Legion of Doom Presents: How We Got Rich Through Electronic Fund Transfers

basic.net
Basic Networking, by Sk8 the Skinhead

basic1.hac
The Basics of Hacking I: DECs By the Knights of Shadow

basic3.hac
The Basics of Hacking III: Data General By the Knights of Shadow

basicnet.hac
Basic Networking (1989) by Sk8 The SkinHead

basics
Rambug's Hacking Volume #1 by Rambug

bbsfiles.txt
The Consumertronics Collection of "A Couple Hacker Files We Downloaded One Evening"

bd-tv5.txt
Cracking the Universal Product Code, by the Black Diamon and the Virtualizer, 7/15/1993

bindery.txt
Ascessing the Novell NetWare 3.x Bindery Files Directly, Bypassing API Calls, by Alastair Grant, Cambridge University (November 3, 1995)

boahack.txt
Hacking Bank Of America's Home Banking System by Dark Creaper of PHIRM

boces.txt
The Slipped Disk takes over the BOCES Computer: A Log

bom-hh&p.txt
The History of Hacking and Phreaking by Raven of BOMB Squad

books.txt
Biblography of Computer Security Books (1973 through 1988)

brute.txt
brUTE: A brute force approach to hacking Unix passwords. Version 1.1

btinfo.h-k
BT Computer Info by Horror kid of the Fiend Club (January 9th, 1994)

c64fun1.txt
Suggestions On What to Do with a Commodore 64, by Nightstalker

callcard.phk
Hacking Calling Cards, by The Pyromaniac

candyland.faq
The Candyman Explains How He Will Accept Explosives Files

carcodes.txt
Codes Used by Computers in Cars

cb1.txt
Citibank Hacking, by Johnny Hundu

cb2.txt
Small Rant about Hacking Citibank

cbiinfo
Using and Abusing CBI by The Ghost

cbrsp-1.hac
The Cyberspace Chronicle Volume 1 by Phardak

cbvhack.pnk
CBV Hacking by PiNK ToRPeDo (June 7, 1994)

cbvhack.txt
CBV Hackin' by Pink Torpedo (June 7, 1994)

chahelp_.txt
Operating the CHAMAS: The Chaos Mailbox System by Thomas Zielke

chaos01.txt
The Pyro's Anonymous Chaos Chronicles #1 by Inphiniti and Decibel, 1990

chaos02.txt
The Pyro's Anonymous Chaos Chronicles #2 by Inphinity and Decibel, 1990

chaos03.txt
The Pyro's Anonymous Chaos Chronicles #3, by Inphiniti and Decibel

chilton1.txt
Hacking the Chilton Corporation Credimatic by Ryche (June 24, 1986)

china02doc.hac
China Newsletter #02 (Hacking/Phreaking File Compilation)

church4.ptl
Church Chat Volume 4 by The Spiker

cis.phk
Hacking the Compuserve Information Service with Various Tricks and Ideas, by Shadow Lord

cisagain.txt
Hacking the Compuserve Information Service with various Tricks and Ideas by Shadow Lord

cisinfo4.txt
Compuserve Information by Morgoth and Lotus

ciss3.txt
List of Access Numbers to the Compuserve Information Service

citibank.txt
Hacking into Citibank with Johnny Hindu

citibank2.txt
Citibank Service Addresses by Dark Helmet of P/H/a (March 21, 1990)

cjack.faq
Cracker Jack FAQ Written by kM (1993)

codphone
Coda-Phones by D.T. Legna

com_sec90.hac
United States General Accounting Office Report: Computer Security..Governmentwide Planning Process had Limited Impact

com_sec91.hac
United States General Accounting Office Report: Computer Security..Hackers Penetrate DoD Systems

compserv.txt
Hacking the Compuserve Information Service with Various Tricks and Ideas by Shadow Lord, Esq.

compus.txt
Free Compuserve Passwords, by Devious Xevious

compuser.txt
A Quick Compuserve Index

compusin.txt
Some Compuserve Tips, by Eric Diamond

compusrv
Compuserve Hacking by The Locksmith

concis.txt
Free Compuserve Access

contact.txt
How to Contact the HACK SQUAD

copier.hac
Magnetic Stripes, by Count Zero

cops-rl
RL C.O.P.S. File by Brian Oblivion

cosmos.hac
C O S M O S, by Doctor Who

cosmos1.txt
Hacking into COSMOS by Wizard of OZ

cosmos2.hac
Hacking COSMOS Part 2 by Lex Luthor and the Legion of Doom

cosmos3.hac
The 1986 COSMOS Files Part III by Sir William

crackam1.txt
Hacking Programs on the Amiga by FunToHack

crackdwn.txt
Crackdown, from 2600 Magazine volume 7, number 1 SPRING

creditfr.txt
The Adventures in Fraud Series Volume I, by Sneak Thief (1985)

credunin.con
Numbers of Credit Unions and protection Agencies

cs.hac
How to Get a Free Account on Compuserve

cs.txt
How to Get a Free Compuserve Account

csl8_93.hac
CSL Bulletin 1993

cuthesis.txt
The Social Organization of the Computer Underground by Gordon R. Meyer

cyber.txt
The Cyberpunk Movement by Pazuzu of DnA May 12, 1993

cyberhac.txt
Hacking Control Data Corporation's Cyber, by The Ghost

data.tap
Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop of a Fed BBS

data_gen
Captain Crunch talks about hacking Data General Systems

database.txt
CIRR Database: A tool for Corporate Research

datakit.hac
How to connect across VCS/ISN boundaries

datanet.doc
The Basics of TELENET

datapac.hac
A Guide to DataPAC by The Fixer

datapac.inf
Technical Guide to DataPac by the New Dark Council (1990)

datapac.txt
A Guide to DataPAC by The Fixer (April 18, 1990)

datapac1.txt
A Guide to DataPAC version 1.1 by The Fixer

datapac2.txt
Datapac 3101 ITI Parameters Description

datapac3.txt
Datapac 3101 Public Outdial Ports

datatap.txt
Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon, Sysop

datatapp.txt
Tapping Computer Data is Easy, and Clearer than Phone Calls! By Ric Blackmon

ddn01.txt
DDN Security Bulletin #1

ddn03.hac
Defense Data Network Security Bulletin #3

ddn04.hac
Defense Data Network Security Bulletin #4

ddn05.hac
Defense Data Network Security Bulletin #5

ddn06.hac
Defense Data Network Security Bulletin #6

ddnet1.txt
DDN: Information on the Defense Data Network from Unauthorized Access UK

ddnet2.txt
DDN: The Defense Data Network (A Map)

debtcard.txt
Harvard Medical School Installs ISDN-Based Debit Card System

dec10.txt
Hacking the DEC-10 System

dec_200.txt
The Decserver 200 Revealed by Surf Studd (October 23, 1990)

defaults.txt
Hacking into a Variety of Systems by using their Default Accounts

defcon.info


defconadd.hac


defdb.hac
Department of Defense Federal Data Bases (List)

defense.hac
Defense Data Network Blues by Harry Hackalot

defense.txt
Defense Data Network Blues by Harry Hackalot (1984)

defnetbl.txt
Defense Data Network Blues by Harry Hackalot (August 31, 1983)

demystif.txt
Compactors Demystified: The Trash Compactor FAQ by Chris Hoaglin

denning.txt
Concerning Hackers Who Break into Computer Systems by Dorothy E. Denning of Digital Equipment Corp (October, 1990)

des.txt
The Data Encruption Standard (DES) Fact Sheet

desblt.txt
The Data Encryption Standard (DES) June 1990

desval.hac
DES Validation List

desval.txt
DES Validation List

dialback.txt
Dial-Back Isn't Always Secure (February 28, 1985)

dialog.txt
Inside Dialog by Control C of Advanced Telecommunications Inc.

dialog01.txt
Inside Dialog, by Ctrl-C of Advanced Telecommunications, Inc.

dialout1.txt
A Novice Manual on Using Outdial Modems by Blue Adept

dialplus.txt
A Screengrab of Informaiton on PSS DialPlus from British Telecom

dialup.hac
List of Dialups. For what? I have no idea.

disclaim
Da Disclaimer, by Filbert

diskopt
My Experiences with Disk Optimizer by P. L. Olympia, Sysop Darwin I and II 11/29/85

djns.txt
Inside DJNS (Dow Jones News Service)

dlog-rdt
Complete Guide To The DIALOG Information Network by Brian oblivion

dnicinf.hac
D A T E X - P - International Traffic Relations

dowjones.txt
Inside Dow Jones News Service

dpacbas.txt
The Basics of DataPAC by Mister X (February 2, 1991)

dpacintr.rot
Introduction to DataPac from the Right of Terror and Deicide

dpacnuas.txt
The Complete DataPac NUA List Release 1.0, from Deicide of Reign of Terror (May 20, 1993)

dtsb.hac
DEC Terminal Server Basics by Mad Hacker

easyl.hac
Hacking Easy Link I by Professor Falken

easylink.hck
Hacking Western Union's Easylink, by Bioc Agent 003, and Tuc

easylink.txt
Hacking Easy-Link I by Professor Falken

edit.txt
Electronic Deception, Interception & Terrorism : The Radio Shack Reality! by Ian A. Murphy of IAM/Secure Data Systems

ena!.hac
The ENA Vision: What IS Ena?

encyclop.txt
Someone Makes fun of That Stupid Article

eproms.hac
A Closer Look at EEPROMS by The Kingpin

eslf0006.txt
The ELSF Presents: Hackers' Conference 1984: Keep Designing (Whole Earth Magazine)

ess.txt
Electronic Switching System by Black Knight, from 2600, Feb. 1984

ethics.hac
Newsweek: Teaching Hackers Ethics

ethics.txt
The Ethics of Hacking by Dissident

evasiv.txt
The Inspector's Thoughts, by Assailant's Blade and Ford Prefect

exeguide.txt
An Extensive Guide to the Protection of Information Resources, by the National institute of Standards and Technology (NiST)

fast.txt
Hacking McDonalds, by Herb the Hacker

fbiaftha.hac
The FBI Fights Computer Crime

fbibust
The FBI Raid of North County in Waltham Massachusetts (December 25, 1985)

fbicompu.hac
Summary of FBI Computer Systems, by Ralph Harvey

fbicompu.txt
Summary of FBI Computer Systems By Ralph Harvey (1986)

fbisys.txt
Summary of FBI Computer Systems, by Ralph Harvey

fcisacc.txt
Getting Free Compuserve Access, by The Wanderjahr

fcscvol1.hac
Federal Criteria for Information Technology Security Volume I

fcscvol2.hac
Federal Criteria for Information Technology Security Volume II

fddi.hac
How to FDDA Internals Work? Learning to Appreciate Tokens

fdp1.txt
The Griffin Presents: Freedom of Data Processing Part 1! By Michael E Marotta

fdp2.txt
The Griffin Presents: Freedom of Data Processing Part 2 by Michael E. Marotta

feds
Watching the Watcher Watching You, by Sir Knight of OSUNY BBS

fh.txt
Documentation for Fuckin' Hacker 2.0, by Hypnocosm (June 10, 1987)

findhole.txt
Security Holes Manifest Themsleves in Four Ways (November 10, 1993)

findho~1.txt
The Four Ways Security Holes Manifest Themselves (November 10, 1993)

force1.txt
Force Files Volume #1 (December 3, 1987)

force2.txt
Force Files Volume #2 (April 17, 1987)

force3.txt
Force Files Volume #3 (August 6, 1987)

force4.txt
Force Files Volume #4 (August 1, 1987)

force5.txt
Force Files Volume #5 (August 6, 1987)

force6.txt
Force Files Volume #6 (August 6, 1987)

force7.txt
Force Files Volume #7 (August 6, 1987)

force8.txt
Force Files Volume #8 (August 6, 1987)

force9.txt
Force Files Volume #9 (August 6, 1987)

freebie3.hac
Compufreebies 3.1 (1992)

freecis.txt
Free Compuserve Access

funwith5.hac
Fun With Automatic Tellers

g.txt
SOFTDOCS: GameTools Version 3.23 by Wong Wing Kin (1993)

garaghak.txt
Garage Door Opener Hacker Plans from Cybertek

gateways
The Inter-Network Mail Guide - Copyright 1990 by John J. Chew

get-vip.txt
DOCUMENTATION: Get-VIP: Getting Very Important Persons from Unix Passwd Files

getbust.txt
Getting Busted: An Experience and a Warning, by Paranoid Punkpig of 415

getinfo.txt
The Hacker's Guide to Investigations, by Ripper of HALE (1989)

gisdoc.hac
Hacking the GIS computer by Doctor Crash

goodbye.ana
The Best of the Station, by The Prowler

goodkids.hac
Computer Hackers are Good People Too!

govthlp.txt
The Help Screen on some Government System

gs1.txt
Packet Assembler/Disasselmbler, Gateway, And Server by Doctor Dissector (March 23, 1990)

gte.txt
Hacking GTE Telemail by Master Micro

guide.txt
A Novice's Guide to Hacking- 1989 edition by The Mentor

guidedoc.hac
The RSTS User's Guide, by The Flash

guidehak.txt
The Neophyte's Guide to hacking (1993 Edition) by Deicide

gunbelt3.txt
Documentation for Gunbelt III (Code Hacking Program) by Lord Blix (August 25, 1987)

hacethi.txt
The Ethics of Hacking, by Dissident of TES

hacethic.txt
The Ethics of Hacking by Dissident

hack.faq
Beta .008 of the 2600/#hack FAQ

hack.hac
Hacking And Computer Krashing #9, by Gray Wolf

hack.leg
A Proposal to Join the Corporate World and the Computer Underground for a Peaceful, Legal Solution by Fatal Error (1990)

hack1.hac
The Basics of Hacking, by the Knights of Shadow (Intro)

hack2.hac
The Basics of Hacking, by The Knights of Shadow (DECs)

hack3
The Basics of Telenet Part I

hack4
Telenet Scanning

hack4.hac
The Basics of Hacking, by The Knights of Shadow (Data General)

hack5.hac
Hacking McDonalds, by Herb of Burger King

hack7
Hacking the Compuserve Information Service

hack7.txt
The Conscience of a Hacker by The Mentor (January 8, 1986)

hack9.hac
Hacking Control Data Corporation's Cyber

hack9301.rpt
The Hack Report Volume 2, Number 1 (January 3, 1993)

hack9302.rpt
The Hack Report Volume 2, Number 2 (February 7, 1993)

hack9303.rpt
The Hack Report Volume 2, Number 3 (March 7, 1993)

hack9304.rpt
The Hack Report Volume 2, Number 4 (April 4, 1993)

hack9305.rpt
The Hack Report Volume 2, Number 5 (May 9, 1993)

hack9306.rpt
The Hack Report Volume 2, Number 6 (June 6, 1993)

hack9307.rpt
The Hack Report Volume 2, Number 7 (July 4, 1993)

hack9309.rpt
The Hack Report Volume 2, Number 9 (September 12, 1993)

hack9401.rpt
The Hack Report Volume 3, Issue 1 (January 29, 1994)

hack_cis.txt
The 15-Minute CompuServe Hack (or, Leeching Made Incredibly Easy) by MacGuyver June 22, 1991

hack_em.hac
The Knights of Shadow Hacking Series, Re-edited and Messed by Elric of Imrryr

hack_s.txt
Harry Hackalot's Official Hacker Address Book for October 1984

hack_ths.txt
The Social Organization of the Computer Underground (Thesis)

hackacr.hac
The Hackers Acronym Chart, compiled by IIRG

hackad.txt
The Famous Hacker's School (Analog Science Fiction Sept. 1990)

hackcos.txt
Hacking COSMOS Part I by Lex Luthor and the Legion of Doom

hackcrak.txt
The Hacker Crackdown, by 2600 Magazine

hackdct1
The Hacker's Jargon File, (November 14, 1982 Version)

hackdict.txt
The Hacker's Dictionary, Older Version, Uncredited!

hacker
The Consience of a Hacker by The Mentor (January 8, 1986)

hacker.tst
The Hacker's Purity Test, June 16, 1989

hacker.txt
SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994)

hacker01.txt
The Social Organization of the Computer Underground: A Thesis

hacker03.txt
The Hacker's Guide to the Galaxy: A Large Selection of Phone Numbers

hacker1.txt
Diary of a Hacker

hacker11.txt
Hacking Western Union's Easylink

hacker2.txt
The Diary of a Hacker Part II by the Cuisinart Blade

hackerdoc.txt
SOFTDOCS: Hacker 1.0 by WadeSoft (March 1994)

hackerla
The Hackers' Laws

hackers.par
Advertisement for the Galactic Hacker's Party (August 1989)

hackethic.txt
The Ethics of Hacking by Dissident

hackfaq.10
FAQ: The Alt.2600/#hack FAQ Beta, by Voyager of TNO (December 18, 1994)

hackfaq.txt
The Hack FAQ By Simple Nomad (January 31, 1999)

hackholl.txt
Hacking In Holland by Rop Gonggrijp (October 18, 1988)

hackhp2.hac
Hacking the HP 2000 by Bioc Agent 003

hacking
Description of the New, Bad Definition of Hacking

hacking.dox
Collections of Hacker FIles Downloaded by Consumertronics

hacking.tap
Style Teaches You About How to Be a Proper Hacker

hacking.txt
Hacking Tutorial, by The Jolly Roger

hacking101.hac
HACKING 101 - By Johnny Rotten - Course #1 - Hacking, Telenet, Life

hackinga.txt
Hacking Bank Of America's Home Banking System by Dark Creaper

hackingc.txt
Hacking Credit Card Codes by Omni-Kid and The Wyvern

hackinge.txt
Hacking ECONet Systems by Jack Death and Zapper

hackingi.txt
Computerworld Asks People to Hack In, 1984

hackingt.txt
Hacking the Lexington Air Force Computer

hackl1.txt
Hacker's Line #1 by 2TUFF

hacknet.dox
The Novell Network Hacking Guide by PeRSeUs/LoRd psYChobeTa of EmC

hacknet.txt
how to Hack Your School's Network, from Dr. Techno of Paradise Lost

hackpcp.hac
The Weenie Warriors present Hacking PC Pursuit Codes

hackprod.txt
How to Hack Prodigy by Desolated Dream

hackprof.txt
Hacker Proof Doors! It IS Possible!

hackquiz.txt
The Hacker Test, Version 1.0 (June 16, 1989) by Felix Lee, John Hayes and Angela Thomas

hackrsts.txt
Hacking RSTS Systems: An Instructional Test

hacksong.txt
The Hacker's Song by Dave Touretzky and Don Libes

hacksynd.hac
The Hackers Syndrome, by Tad Deriso

hacktalk.txt
A Short Hackerspeak Glossary, by the Hollywood User Group

hackterm.txt
Collection of "Hackernyms" by Rad Man version 2.10

hacktest.txt
The Ultimate Hacker Test Verison 3.0 by Rich Crash Lewis, Junior (1992)

hacktips.hac
Hacking Tips #2, by Hoe Hopper

hacktips.txt
Tips for Tracking Hackers

hacktut.txt
Hacking Tutorial, by The Jolly Roger

hackunlm.hu1
Hackers Unlimited Magazine Volume 1 Issue 1

hackusa!.hac
Hackin' USA

hackwarn.hac
A Warning to Hackers

hackwwiv.hac
Hacking into WWIV, Second Edition by Vision

hackwwiv.txt
Hacking into WWIV Software by Vision

haibm370.txt
How to Take Control of your Local IBM VM/370 System by Another Hacker of the Elite Phreakers' Club

hakdec20.txt
An Addendum to A Novice's Guide to Hacking, by The Mentor

hakdic.txt
The Hacker's Dictionary, A Guide to the World of Computer Wizards

hakmedia.txt
Hackers in the Media, List start: 10/28/92 - Doomsday

handbook.txt
Hacking Compuserve: All You Need to Know, by Mr. Perfect

haq1.txt
The HAQ Edition 2.07 (June 11, 1994)

hashish.txt
Hashish: The Exotic Elixir, by EZ Rider

hate.info
Invitation to HATE: Hackers at The End (Summer 1995)

havok1.txt
HAVOK Pack #1: The Return (Collection of Hacking Textfiles)

hckr_hnd.txt
The Hacker's Handbook by Hugo Cornwall (1985)

hckrslg
The Hacker's League, by Lee Felsenstein (March 18, 1992)

hd.hac
Summary of Hacker Supreme's Hacking Directories 1-40. by the 0mega of the Alliance/Hacker Supreme

hd01.hac
Hackers Directory Volume #1 by Ninja Squirrel and Logan5

hd02.hac
Hackers Directory Volume #2 by Ninja Squirrel and Logan5

hd03.hac
Hackers Directory Volume #3 by Ninja Squirrel and Logan5

hd04.hac
Hackers Directory Volume #4 by Ninja Squirrel and Logan5

hdigest.txt
The Hacker's Digent by Harry Hackalot (October 1984)

hdindex.txt
Summary of Hacker Supreme's Hacking Directories 1-40 by The 0mega (September 10, 1986)

hedrick.txt
An Introduction to the Internet Protocols by the Computer Science Facilities Group of Rutgers (July 3, 1987)

hfnewbies.txt
The Neophyte's Guide to Hacking, 1993 Edition Version 1.2 by Deicide (October 23, 1993)

hhacking.iix
CAT-HACK Volume 1 from The Mystery

hint.txt
The Czar's Guide to the Young Criminal Accused of Using Computers

his-hp.txt
The History of Hacking and Phreaking by Raven of BOM SQUAD

hk_acces
Draft Chapter of the NIST Computer Security Handbook, from Ed Roback

hk_crypt
Draft Chapter from the NIST Computer Security Handbook, on Cryptography

hk_i&a
Draft of the NIST Computer Security Handbook on Identification and Authentification

hk_polic
Draft of the NIST Computer Security Handbook on Computer and Information Security Policty

hoho93.ad


hoho93cz.hac


hohocon.93


holelist.txt
How Security Holes Manifest Themselves

holes.txt
A List of Holes in Various Operating Systems (April 7, 1993)

homebank.hac
Hacking Bank Of America's Home Banking System by "Dark Creaper"

homebank.txt
Hacking Bank of America's Home Banking System by Dark Creaper of PHIRM

horror_s.tor
Hacking Horror Stories 1982

hp20001.hac
HP 2000 Part 1: Commands by Blitzoid and Galactus

hp20002.hac
HP 2000 Part 2: Statements by Blitzoid and Galactus

hp20003.hac
HP 2000 Part 3: Functions by Blitzoid and Galactus

hp20004.hac
HP 2000 Part 4: Files by Blitzoid and Galactus

hp20005.hac
Hp 2000 Part 5: Matracies by Blitzoid and Galactus

hp30.txt
The Completel Hewlett Packard 3000 Hackers Guide

hp3000.hac
The Complete Hewlett Packard 3000 Hackers Guide

hp3000.txt
The Complete Hewlett Packard 3000 hacker's Guide (March 28, 1991) by AXIS

hp3000_t.hac
Hacking the HP 3000 by DE BUG

hp3000g.hac
The Complete Hewlett Packard 3000 Hackers Guide

iah1.txt
The International Hackers' Association Issue #1

ibm-vm70.txt
A Beginner's Guide to the IBM VM/370 (Or What to Do Once You've Gotten in) by Elric of Imrryr of Lunatic Labs Unlimited

ibm370.hac
How to Take Control of your Local IBM 370 by Another Hacker

ibmhack.hac
Hacking the I.B.M. By John Doe

icebook1.txt
ICE: Inner Circle Elites Present: The Hack/Phreak Handbook v1.00 by Liquid Jesus (June 9, 1992)

icebook2.txt
ICE: Inner Circle Elites Present: The Hack/Phreak Handbook Issue #2 by Liquid Jesus

icon4u.nrg
ICoN Hacking with Loser Access by �����GY�

id-biz.txt
How to Have a Profitable ID Business, by Mr. Puff n' Stuff

identity.txt
How to Create a New Identity by the Walking Glitch

ihg.txt
International Directory of Hacking and Phreaking Organizations, by John Simmons

iirgacr6.txt
The Hackers Acronym Chart by The International Information Retrieval Guid Version 6 (December 7, 1992)

iirgacr7.txt
The Hackers Acronym Chart by The International Information Retrieval Guid Version 7 (February 6, 1993)

iirgacr8.txt
The Hackers Acronym Chart, by the International information Retrieval Guild (IIRG)

iiu-001.txt
Bust Avoidance for Dipshits by Derision of IIU (1990)

iiu-004.txt
Hacking on the Compuserve Information Service by Darkness (1990)

illinet.txt
Dial-Up Access Numbers for ILLINET Online

info.txt
How to Get Detailed Information on Anybody by DTS

info3.gph
How to Get Anything on Anybody Part III

infoam.txt
Exploring Information-America by Omega and White Knight

informer.hac
TRI : The Remote Informer, Volume 1, Issue #6

innerc.txt
Blindman's Bluff, Hacker Style, from Out of the Inner Circle by Bill Landreth

innercir.hac
Hacking Techniques, Typed in by Logan5 from The Inner Circle

intercep.hac
The Tempest Method of Comptuer Data Interception by Al Muick (Needs Editing)

intercpt.txt
Pager, Fax, and Data Intercept Techniques, by The High Tech Hoods

intruder.dox
SOFTDOCS: Intruder v1.21 by CreaSoft

inttel.hac
European Computers List #1 by Kerrang Khan

issm201.hac
The Information Systems Security Monitor Volume 2 Number 1

issm202.hac
The Information Systems Security Monitor Volume 2 Number 2

issm204.hac
The Information Systems Security Monitor Volume 2 Number 4

issm301.hac
The Information Systems Security Monitor Volume 3 Number 1

issm302.hac
The Information Systems Security Monitor Volume 3 Number 2

issm303.hac
The Information Systems Security Monitor Volume 3 Number 3

issm304.hac
The Information Systems Security Monitor Volume 3 Number 4

jack14.txt
Documentation for Cracker Jack, THE Unix Password Cracker (June 1993)

janet.txt
JANET PAD Listing Revision 1.2 (March 1st, 1990)

jargon211.hac
The Jargon File, v.2.9.11, by Eric S. Raymond

javabugs.txt
JavaScript Problems I've Discovered

keylock.sch
Schematic For an Optoelectronic key Lock by Joe Scharf

keytrap3.txt
SOFTDOCS: Keytrap v3.0 by Dcypher

kfyi-593.hac
KFYI AM Radio 910 interviews Mind Rape and Merc

kill.feds
FEDS: How to Find and Eliminate Them (September 10, 1987)

l0pht.txt
The L0pht... What I saw, by Tfish of RDT

lan.txt
Local Area Networks (LANs) by ANSI-Christ

lca-1.txt
LCA #1: Zen and the Art of Untraceable Hacking, by Flood

lca-2.txt
LCA #2: Sprintnet in a Nutshell, by The Lemon Curry Alliance

lca-3.txt
LCA #3: So Just What Is This LCA Thing, Anyway? by Flood of the Lemon Curry Alliance

lca-4.txt
LCA #4: A Definitive Study on Primate Behavior, by Lemon Curry Alliance

lca-5.txt
LCA #5: Phone Patching Made Easy, by Pinball Wizard of Lemon Curry Alliance

lca-6.txt
LCA #6: Beige Boxing, by the Lemon Curry Alliance

ldd.txt
How to Hack into CIS

license.asc
The Guerilla Guide to Licensing Software

list2
Pacific Bell Computer Systems, by Another Hacker

litewave.sch
AM Lightwave Transmitter and Reciever by Joe Scharf

lnoise.hac
Modem Noise Destroyer (Alpha Version)

lodhbasi.hac
The LOD/H Present: A Novice's Guide to Hacking- 1989 edition

logoncbi.hac
How to Log Into a CBI System by L.E. Pirate and Zangin (from NIZation)

logoncbi.txt
How to Log into a C.B.I System by L.E. Pirate

longpass.txt
Generating Longer Passwords

machack0.5.txt
The Mac Hack FAQ by AX1P (November 22, 1994)

mag_stripes.txt
Magnetic Stripe Technology, by Chrisopher R. LaFave (July 3, 1994)

magnet.01
Magnetic Stripes on Cards: An Overview

magnet.02
Card-O-Rama: Magnetic Stripe Technology and Beyond or A Day in the Life of a Flux Reversal (November 22, 1991)

mailbox.hac
Mailbox Systems: Your Link to the Underworld

main.fra
Main Frames by the Pirate Club

mainfrms.con
A List of Mainframe Dialup Numbers

master.txt
Master Hack Version 1.0 by Master Frodo (January 1, 1991)

mci.txt
MCI Mail Access Numbrs, from The Swamp

mci__acc.txt
List of MCI Access Numbers

mcimail.hac
MCI Mail - The Adventure Continues, by Bioc Agent

mcisprin.t
Hints on Hacking, byt the RAMBUG and Captain Blood

memory.lst
The Format of the BIOS Data Segment at Segment 40h (July 31, 1994)

mgtguide.txt
The NIST Management Guide to the Protection of Information Resources

mickeyd.txt
Hacking McDonalds by Herb the Hacker

micrrisk.hac
Microcomputer Security Servey (By the Naval Computer and Telecommunications Station Standards and Security Branch)

milinet.1
Milnet Access Codes

milnet.txt
How to Use the American Military Net

milnet1.hac
Milnet, by Brigadier General Swipe

mish18.txt
The Dartmouth Kiewit System by The Lone Ranger (January 5, 1986)

mism1.hac
How to Get Anything on Anyone Excerpts

mism10.hac
How to Get Anything on Anyone Excerpts

mism20.hac
Mastering the SCANTRON by Warhead

mism42.hac
Xerox Voice Message Exchange Commands, from The Lineman

mob.txt
The Hackers in the MOB

modbook1.txt
The History of MOD: Book One: The Originals

modbook2.txt
The History of MOD: Book Two: Creative Mindz

modbook3.txt
The Book of MOD: Part Three: A Kick in the Groin

modbook4.txt
The Book of MOD: Part Four: End of '90-'1991

modbook5.txt
The Book of MOD: Part 5: Who are They And Where Did They Come From? (Summer 1991)

morality.hac
Hacker Morality: A Lesson

morestuf.txt
Collection of Hacking Files (Should Eventually be Split up)

morprime.hac
RVEC Parameters and DMSTK Format

mrsts.hac
So you've finally decided to down an RSTS System?

mtempist.hac
The Tempest Method of Data Interception (Needs Editing)

narc3.hac
Nuclear Hackers Phreakers Cards Information: How to Hack Effectively, by Prometheus (September 14, 1989)

ncsc-tg-003.txt
A Guide to Understanding Discretionary Access Control in Trusted Systems (September 30, 1987)

ncsc-tg-016.txt
Guidelines for Writing Trusted Facility Manuals

ncsc-tr-005-2.txt
Introduction to Trusted Computer System Evaluation Criteria

ncsc_oas.txt
A Guideline on Office Automation Security (December 5, 1986)

netbios.txt
Understanding NetBIOS by NeonSurge of Rhino9

netcrack.txt
DOCUMENTATION: Advanced NetWare Security Cracker Version 1.00

networks.phk
2600: How to Send Mail to other Networks

neuroman.pwd
List of DataBases and passwords for the game "Neuromancer"

newid.hac
New Identity Method

newsltr.idx
Index to the Computer Underground Digest Archives (June 13, 1991)

nextbugs.txt
CERT Advisory on the NeXT computer's Software

nfs_trace.txt
NFS Tracing by Passive Network Monitoring, by Matt Blaze of the Dept. of Computer Science at Princeton

nha-app.txt
Application to Join Network Hackers Alliance (June 1, 1991)

nimbus.txt
Research Machines Nimbus hacking, by The Green Rhino

note9309.txt
The Hack Report, by Lee Jackson (September 1993)

nov-faq.txt
The Unofficial Netware Hack FAQ Beta Version 3 by Simple Nomad

novell.hac
Collection of security holes in Novell Netware

novell.txt
SOFTDOCS: Hacking Novell Local Area Networks by Pale Rider (1991)

novhack.txt
Having Phun With Novell by Lord Foul/Decay (July 13, 1991)

nwhack.faq
Frequently Asked Questions about Hacking Novell Netware by Simple Nomad

obscene.###
TAG FILE: Obscene Phobia BBS (January 1, 1995)

ocfber.1
Bylaws of the Open Computing Facility at UC Berkeley

ocfber.2
Constitution for the Open Computing Facility at UC Berkeley

omron.pin
How to Connect OMRON 3S4YR-HSR4 to your PC

orange
Department of Defense Trusted Computer System Evaluation Criteria (The Orange Book) 15 August 1983

orange.txt
The Department of Devense Trusted Computer System Evaluation Criteria (August 15, 1993) (The Orange Book)

orgs.hac
A Large List of Computer Security Organizations

orgs.txt
1988 List of Computer Security Organizations

outdial.lst
Complete Collection of PC pursuit Outdials, by The Renegade Legion (January, 1991)

outdial.txt
How to Use Outdials: An Introduction by Lorax

outdials.us
Ameican Local Outdials by Sebastian Winchler (March 1991)

outdialsnfo.hac
List of Dialouts

pacbell.lst
Collection of Pacific Bell Computer Systems

packet.txt
Notes on Using Tymenet and Telenet by Michael A. Banks (1989)

pacnet.hac
Hacking into the PACnet System

pactimea.txt
Telephone Numbers for the Pacific Bell Computer System by Another Hacker

passhack.txt
The Fixer Presents Password Hacking, a Scientific Breakdown of the Free Press

password.txt
Password Security: A Case History Encryption Computing by Robert Morris and Ken Thompson (April 3, 1978)

pcp88.lst
PC Pursuit List Version 1.1 (August 31, 1988)

pcpbas.txt
How to Use PC Pursuit Service

pcphack.phk
Hacking PC Pursuit Codes by The Weenie Warriors

pcphack.txt
The Weenie Warriors Present Hacking PC Pursuit Codes

pcpold.phk
How to Use Telenet's PC Pursuit Service by Z-Man

pcpursue.txt
PC-Pursuit Outdialing System: The Complete Guide, by Digital Demon of the Modernz, 1992

pcpursui.yes
PC Pursuit and Telenet Local Access Numbers

pdnaxis.txt
The Public Data Network Numbers

pdp11.hac
Pdp-11 Basic plus programming by Executive Hacker and Corporate Criminal

pentagon.txt
The Milnet File by Brigadier General Swipe/Dispater

ph.txt
Soft Documentation: P-Hack 1.0 by Peter King

phonecom.nfo
Becoming More Informed (Becoming a Hacker)

popper.txt
ADVISORY: Shell Access Users can Use POPPER to Create Root Owned Files by Mark Fullmer (May 6, 1994)

prime.hac
A List of PRIME Commands

primecpl.hac
An Introduction to PRIMOS CPL Directives by Necrovore

primer.txt
Coping with the Threat of Computer Security Incidentys, by Russell L. Brand (June 8, 1990)

primes.txt
Message Base With Discussion of the Watch utlity on PRIME (August, 1988)

primos.hac
Hacking Primos Systems By Nanuk of the North

primos1.txt
Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers

primos2.txt
Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers

primos3.txt
Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers

primos4.txt
Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers

primos5.txt
Introduction to the Primos Operating System by Violence (1989) of The VOID Hackers

psnintro.txt
The Complete Introductory Guide to Sprintnet and Similar Packet-Switched Networks by Doctor Dissector (April 22, 1990)

psns.txt
An Explanation of Packet Switching Networks, by Doc Holiday and Phantom Phreaker

pumpcon.txt


pw-hack.txt
The Art of Password Hacking by HIT

qsd.txt
How to Access Minitel or How to Have FUN on QSD

racintro
Information on RAC: A Host System Used for Access to GEnie and AppleLink

raclog1
An Example of an RAC Login

raclog2
An Example of an RAC Login, Part II

ram1
Hacking Rampart Systems Part 1

ram2
Hacking Rampart Systems Part 1 (cont)

ram5
Hacking Rampart Systems Part 2

ram6
Hacking Rampart Systems Part 2 (cont)

ramcomm.hac
Hacking RAM Communications (Pager)

rampart1.hac
Hacking Rampart Systems by Whackoland

rampart2.hac
Hacking Rampart Systems by Whackoland Part II

rcaglobe.txt
The RCA Network Part I by the Telex Troopers

read.me
A Story About the TSR That Catches Passwords, and a short History

readme.now
SOFTDOCS: Gold Cup Verison 1.2: The Ultimate Executables Unpacker

readme.txt
Force Files Explanation

reid.txt
The "Reid Thread", where a Standford Admin learns security the hard way (September 26, 1986)

revblt.hac
Review of Federal Agency Computer Security and Privacy Plans

riacs
Principles of Responsible Use of RIACS Computing Facilities

rimeman.hac
RIME User's Guide

ripco.txt
The Doctor Ripco Seizure by Full Disclosure (1991)

risks.txt
Avoiding the Risks of Hacking: A List of Suggestions by IC

risktool.hac
Risk Management Research Library Overview from the National Institute of Standards and Technology (NIST)

rom.txt
Macintosh ROM Secrets by The Cloud (November 23, 1990)

rowdy_dl.man
DocumentationL The Rowdy Dialer (April 1993)

rspwd.new
Some Downloaded Password File

rsts.hac
So You've Decided to Down a RSTS System, by Sam Sneed

rsx11.hac
RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus and Lord Digital

rsx11m.txt
RSX11M Version 3.X Real Time Operating System: An Introduction by Terminus & Lord Digital

ruhacker.txt
Are You a Hacker? By ReDragon

sanatmdoc.hac
Getting into an ATM

saruman.add
TAG: Saruman BBS Ad

satan~1.txt
A Look at SATAN (Security Program) by John Fisher of the CIAC Team (March 29, 1995)

satcon.txt
Satellite Control, by Ninja Squirrel & Logan-5

satelit3.txt
Satellite Scrambling Systems: The Truth, by XL

satelite.txt
Satellite Frequencies, by Sir Francis Drake

scanprg.txt
What To Look For In A Code Hacking Program, by Dissident

school.txt
Screwing with School Computers, by Liquid Bug

secrets2.hac
Big Secrets Volume #2 by The Wyvern: Pop-Up Voids, Magnetic Stripes, and The Post Office

secrets3.hac
Big Secrets Volume #3 by The Wyvern: Crest Toothpaste, Free Keys, and Secret Things

secretsdoc.hac
Young's Demonstrative Translation of Scientific Secrets (1861)

securdev.txt
Technical Hacking Volume 1 by the Warelock

security
Overview of Computer Security by E.A. Bedwell, EDP Specialist

security.fy8
Site Security Handbook, 1991

security.txt
Professor Falken's Guide to CODE Hacking Security

sequence.txt
Sequence Number Attacks, by Rik Farrow

sha.hac
Swedish Hackers Association Annual Year Protocol #4

shadec.txt
The use of a DECserver (Documentation) By the Chief of Swedish Hackers Association

shahewl.txt
Swedish Hacking Association presents Hacking HP 3000 Part 1

shaprot3.txt
The 3rd Protocol (1990) by The Swedish Hackers Association

shawn-file-check
The Awesome Power of TELIX Scripts by Shawn Da lay Boy Productions

shw0293.asc
Syndicated Hack Watch (March 1993) William Shakespeare and Cable Porn

shw0394.asc
Syndicated Hack Watch (March 1994) by John McCormac

shw0494.asc
Syndicated Hack Watch (April 1994)

shw0593.asc
Red Hot Television is Banned

shw0893.asc
The Start of the Skybox Cable War

shw0993.asc
Syndicated Hack Watch (September 1993) "Red Hot TV Makes a Comeback"

shw0994.bbs
Syndicated Hack Watch (September 1994) Phoenix Program Kills Sky's Access Control

shw1093.asc
Syndicated Hack Watch (October 1993) Piracy Covered by Mainstream Press

skel_key.txt
SOFTDOCS: Skeleton key: PC Unlocking Utility by the National Authoritarians Society

skey.txt
Description of the S/KEY One-Time Password System bty Neil M. Haller and Philip R. Karn

skeyfl.txt
Vulnerabilities in the S/KEY One Time Password System by Mudge of L0pht Heavy Industries

skyhack.hac
The Videocrypt System by Darrn Ingram of SATNEWS (June 5, 1991)

sniffer.txt
FAQ: The Sniffer FAQ Version 1.7

snoop
Data Snooping the Right Way by Lee Day of Abstruce Authors of Merca

snoop.txt
Data Snooping the Right Way by Lee Day

sourcetelnet.txt
The Source Telnet Directory, and Uninet Directory

ss-info2.txt
The Social Security Number, by Barbara Bennett

ssan.hac
The Social Security Number

ssn-stuf.txt
More about why Social Security Numbers are Insecure

ssnum.ana
About Social Security Numbers

starlink.txt
Information on Galaxy Starlink: A User's Guide

starmast.txt
Hacking the Gandalf Starmaster by Deicide (May 22, 1993)

statemind.txt
So, You Wanna Be a Hacker? It's a State of Mind!

stoll.doc
Writings of Clifford Stoll

storehac
Cracking/Hacking Those Shitty Store Display Computers by ICEoLatEor (August 27, 1991)

stupidki.hac
Those Stupid Little Bastard Hackers!

sun413.txt
How to improve security on a newly installed SunOS 4.1.3 system. by Thomas M. Kroeger (July 1994)

sundevil.txt
Operation Sundevil, by the Prodigy

superd.txt
DocumentationL Superdial 1.03 by Evan Anderson

sys75.hac
The Complete Guide to Definity G Series Systems (System 65-75) by: Scott Simpson

ta&m.txt
Texas A&M Network Security Package Overview 7/1/1993

tachelp
Captures of Information on TACACS by The Argonaut

tan.txt
List of Telenet Access Numbers by Daredevil of P/HUN

tcp-ip.txt
FAQ: The TCP/IP FAQ by George V. Neville-Neil (April 1, 1996)

tcsb.03
Telecom Computer Security Bulletin: ItaPac, a Brief Introduction, by Blade Runner (August 11, 1988)

tcsb.04
An Introduction to PRIMOS CPL Directives by Necrovore

tcsb.05
Telecom Computer Security Bulletin: An Introduction to Packet Switched Networks Part I, by Blade Runner (August 20, 1988)

tcsb.06
Telecom Computer Security Bulletin: An Introduction to Packet Switched Networks Part II, by Blade Runner (August 20, 1988)

tcsb.08
Telecom Computer Security Bulletin: Your Personal Phone Security, by King Lucifer (August 10, 1988)

tcsb.11
Telecom Computer Security Bulletin: DEC Terminal Server Basics by Mad Hacker (September 10, 1988)

tcsb.12
Telecom Computer Security Bulletin: Expansion of the Z80 Chip, by King Lucifer (Alias Byteman) on September 10, 1988

techhack.hac
A Guide to ADS System, by Lord Digital and the Phantom

techiq.txt
Hacking Techniques, by Logan-5 (Hacker Supreme)

technicl.txt
Technical Hacking: Volume One by the Warelock

tele3.txt
Telenet Scanning by Doc Telecom (July 11, 1988)

tele4.txt
An Overview of Telenet by Man Max

tele5.hac
Hacking Telnet by The Flash

telecode.txt
Telenet Codes, Hacked Out by ZORON (May 1, 1988)

telecomm.txt
An Introductory Guide to Telenet Commands

teleinfo.txt
Telenet Hacking by Hell's Hackers and Invisible Stalker (January 9, 1987)

telenet.hac
Telenet: The Secret Exposed

telenet.txt
An Introductory Guide to Telenet Commands

telenet2.txt
A Good amount of general Telenet Information

teleneth.txt
An Introductory Guide to Telenet Commands

teleneti
Telenet Hacking Volume 1 by Invisible Stalker of Hell's Hackers (January 9, 1987)

teleneti.phk
Instructions for using TELENET.

telescan.txt
Information on Telenet Scanning

tellerma.txt
Cracking Auto Bank Teller Machines by the Suspect

teln2.txt
Telenet Terminal Identifiers

teln3.txt
Welcome to the TCO Access Listing (September 15, 1987)

telnetsn.txt
Telenet Scanning by Doc Telecom (July 11, 1988)

telnumbe.txt
Telenet Access Numbers, by the Weenie Warriors

teltermz.txt
List of Terminal Identifiers

tempest.hac
Excerpt of article on Tempest

thc.nfo
NFO: Get-Vip 1.2thc by Van Hauser (January 10, 1995)

thc2.nfo
The Hacker's Choice NFO: RA-BBS Hack Tools Hardware Support (May 18, 1996)

thehaq.txt
The HAQ (Hack-FAQ Version 2.07) (June 11, 1994)

thuglan1.txt
Introduction to Hacking into LANs by THUG

thuglan2.txt
General Information on LANs by THUG (July 31, 1991)

tihack2.txt
Hacking the TI-85 Calculator, by David Boozer (September 1, 1994)

timenet.txt
Hacking Tymnet by Byte Brain

tl-user.txt
ToneLoc v0.98 User Manual, by Minor Threat and Mucho Maas

tl.q-a
ToneLoc v0.98 Troubleshooting and Question-and-Answer Manual

tmplefun.txt
Fun with Temple's Computers (A How To)

tnet1.txt
Tymnet File #1 by The Twilight Phone

tnet2.txt
Tymnet File #2 by The Twilight Phone

tnet3.txt
Tymnet File #3 by The Twilight Phone

tnpcpod.txt
TeleNet PC-Pursuit OutDials & TymNet OutDials Listing from 1990-1991 by Iaxom

tops20.txt
Note on Tops-20 Systems by The Blue Archer and the Legion of Hackers!

transdir.txt
The Legion of Doom/Legion of Hackers Presents the 1-800-NNX Translation Directory

trash.txt
Dumpster Diving: An overview of the legality, by Full Disclosure

trashing.rot
The Art of Trashing by Deicide

traxtool.txt
The Trax Toolbox Volume #001 by Track

triad187.hac
The Triad: A 3-in-1 Textfile Magazine, Issue #1

trojan
Rumors of Worms and Trojan Horses by Mike Guffey

tsrcrack.txt
SOFTDOCS: TSR Crack Verison 1.0 by Wong Wing Kin (1993)

ttyspoof.txt
TTY Spoofing, by SubEthan

tym_ods.txt
TymNet OutDials Sorted By Area Code

tyme2.txt
International Packet Switching Services Description

tymenet.hac
Tymenet Technical and User Information

tymnet.ods
Listing of Tymnet ODS Systems

tymnet.txt
Packet Networks I and other Tymnet Information by Digital Demon, 1990

tymnet96.txt
BT-GNS Worldwide Tymnet Dial (Version 9.6, March 11, 1994)

ueber.txt
A Guide to Internet Security: Becoming an Ubercracker and Becoming an Uberadmin to Stop Ubercrackers, by Christopher Klaus (December 5, 1993)

uk.dialups
A List of Modem Dialups in the UK (September 22, 1990)

ukguide.hac
The Guide to Online Databases for UK Users

ulimate.txt
The Ultimate Beginner's Guide to Hacking and Phreaking by Revelation (August 4, 1996)

ultrad3.txt
The Ultimate in Wargames Dialers: UltraDial 3.0 Documentation by Paul Levy

unineta.phk
Uninet Information, from The South Pole

unp.txt
SOFTDOCS: UNP 3.31 by Ben Castricum (April 15, 1994)

up.txt
SOFTDOCS: UP.EXE Version 3.2 by Wong Wing Kin (1993)

usrguide.txt
The NIST Computer User's Guide to the Protection of Information Resources

vanish.txt
The Hacker Who Vanished: Suicide or Clever Hoax?

vax-7.txt


vendors.hac
Large Security Vendors List

verstell.ana
Neat Fun with Versatellers

virus
Attack of the Computer Virus, by Lee Dembart

vmbhack.txt
Hacking Voice Mail Boxes by Tik Tak

vmsptuto.txt
The IBM VMSSP System, by The Motorhead

vthack1.txt
The VT Hacker, by the Man Hermit

vthack2.txt
The VT Hacker #2, by the Mad Hermit

vthack3.txt
The VT Hacker #3, by The Mad Hermit

vtp.txt
A Guide to Video Tape Protection, by Shane Raistlin Monroe (Decmber 11, 1989)

wal-mart.txt
Hacking the Wal-Mart Armorguard Computer Protection System

wanghack.hac
Hacking the Wang OS, by Dark Knight

wargames
The top 25 *unbelievable* things in War Games, by TheCure (October 16, 1991)

wargames.hum
Is Wargames Possible? BULLSHIT! An Overview by The Jabberwock

watching
Watching the Watcher Watching You by Sir Knight

wats.txt
WATS Version 1.0 by Professor Falken & The Aptolcater

whca_txtmsg.log
The Now Infamous White House Pager Logs; Next Time, Enccrypt your Pages!

xerox.hac
Hacking Xerox

xmux.txt
The ROT Guide to Gandalf XMUX's by Deicide

zen.hac
Dan Farmer's Improving the Security of Your Site by Breaking Into It

zippass.txt
The Security of PKZIP Encryption