ETHICS & HUMOR
Name
Description
Size
Hackers Manifest The hackers manifest by the Mentor. Every hacker should know this 1,755 bytes
Diary of a hacker Duh... 13,226 bytes
Hacker Ethics What is A hacker ? 2,777 bytes
Are you a hacker ? See if you fit this description... 784 bytes
How I knew when I was a hacker Another file on being a hacker 2,585 bytes
A Guide to Internet Security: Becoming an Uebercracker and Becoming an UeberAdmin to stop Uebercrackers A joke, not to be taken seriously (unless you want to go to jail, of course...) 4,035 bytes
Concerning Hackers Who Break into Computer Systems File on hackers by a sysop who's sympathetic to hackers 22,914 bytes
Zero Tolerance Book on bad ass mother fuckers in the old days 181,467 bytes
The Hacker Crackdown Good book that describes the hacker crackdown of 1991 275,654 bytes
Ethics Of A True Hacker Recent file written by The Mob Boss about hacking ethics. Nice 2,952 bytes
The Mob Boss's Guide To Hacking Guide for beginner hackers on how to start by The Mob Boss. Read this if you're just starting 12,224 bytes
Psychological Profile Of The Troubled Female Teen Funny file on how to hack girls. Read it for a laugh 5,143 bytes
How To Be A Hacker File that explains the hacker mentality. Nice one 11,834 bytes
Humor Teaches you how to be 31337 15,613 bytes

UNIX
Name
Description
Size
Hackers Kit Explains UNIX security all round and shows a few basic old bugs. Also has a root kit. This was the file that taught me the basics of hacking UNIX 295,129 bytes
Unix Computer Security Checklist Security holes to look out for when hacking a system 26,429 bytes
Improving the Security of Your Site by Breaking Into it Nice (old) paper on common holes 20,827 bytes
Unix : A Hacking Tutorial Well written file on the basics of unix 37,944 bytes
Millenium Hacking A file written to show people what hacking was like at the end of the 20th century. Basic, but good for beginners 368,329 bytes
Unix for Intermediate Users Not so much a hacking file, just explains the basics of unix. 71,758 bytes
Crash Course In X Windows Security Explains the basics of X Windows security 5,449 bytes
Playing with the Internet Daemons Old file explaining bugs in daemons, good for beginner hackers to get an idea about what security holes are 6,467 bytes
Secure UNIX programming FAQ Explains the basics on how to code safely in UNIX 21,211 bytes
NFS Tracing By Passive Network Monitoring Good read if you're interested in NFS 12,368 bytes
Linux Administrators Security Guide THE linux security resource (PDF) 273,688 bytes
Securing and Optimising Red Hat Linux I cannot praise this enough. 475 pages of how to secure your redhat box properly. READ IT!!! (PDF) 2,468,188 bytes
Kernel hacking made easy Short tutorial that provides a nice introduction to kernel system calls 3,796 bytes
Coding with the DNS protocol Short tutorial on coding with DNS 8,740 bytes
Linux Firewalling - Insights and Explainations... Read this and learn a bit about firewalls 5,358 bytes
A Lab engineers check list for writing secure Unix code Paper that explains a few things you can do to code more secure programs in Unix 8,106 bytes

SOCKETS
Name
Description
Size
BSD Sockets: A Quick And Dirty Primer This is a short tutorial that explains what sockets are, how they work, and gives sample code showing how to use them. 486,960 bytes
A brief programming tutorial in C for raw sockets Teaches the basics of using raw sockets in C, to insert any IP protocol based datagram into the network traffic. 7,309 bytes

CRACKING
Name
Description
Size
How To Crack Good file that teaches the basics of cracking 122,376 bytes
The Ancient Art Of Cracking Another excellent file on cracking 68,917 bytes

BUFFER OVERFLOWS
Name
Description
Size
How to write buffer overflows File that explains how to write buffer overflows 7,195 bytes
Smashing The Stack For Fun And Profit Excellent file that explains buffer overflows 15,191 bytes
Exploiting Windows NT 4 Buffer Overruns By far the best file I've found that explains buffer overflows in NT 12,629 bytes
Writing buffer overflow exploits - a tutorial for beginners Short and sweet tutorial 8,916 bytes
Libsafe : Protecting Critical Elements of Stacks Nice whitepaper that explains buffer overflows and what libsafe does (PDF) 177,423 bytes
Buffer Overrun Attacks Explains what buffer overflows are. Good for beginners (PDF) 387,028 bytes
Advanced buffer overflow exploit Shows all the cool sutff you can do once you've found a buffer overflow 9,169 bytes
Compromised - Buffer Overflows, from Intel to SPARC Version 8 Talks about what buffer overflows are, why they work and how to approach them. Again, a good file for beginners 19,141 bytes
w00w00 on Heap Overflows Nice and sweet tutorial on heap-based buffer overflows 13,408 bytes

NOVELL NETWARE
Name
Description
Size
The unofficial netware Hack FAQ Everything you wanted to know about netware 41,634 bytes

DENIAL OF SERVICE
Name
Description
Size
Introduction to denial of service Intro on denial of service attacks 17,459 bytes
Protecting Routing Infrastructures from Denial Of Service Using Cooperative Intrusion Detection Whitepaper that explains a method to combat DoS attacks. Interesting read (PDF) 118,400 bytes

CGI
Name
Description
Size
Safe CGI Programming Nice little paper that explains the basics for writing safe CGI code 6,456 bytes

CODING
Name
Description
Size
C Programming Nice and sweet C tutorial 200,316 bytes

MISCELLANEOUS
Name
Description
Size
Modern Hackers Deskreference Reference file with things that every hacker should know. Contians info on WindowsNT security issues, Unix, Linux, Irix, Vax, Router configuration, Frontpage, Wingate and much much more. READ IT 182,301 bytes
Common Insecurities Fail Scrutiny Explains Netbios & Samba bugs and how to exploit them 46,313 bytes
Techniques Adopted By 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private Networks Explains the basics on how to hack a system from a system administrators point of view (VERY basic) 12,027 bytes
The unofficial Web Hack FAQ Nice things to do with the web 54,000 bytes
Simple Active Attack Against TCP This paper describes an active attack against the Transport Control Protocol (TCP) which allows a cracker to redirect the TCP stream through his machine thereby permitting him to bypass the protection offered by such a system as a one-time password [skey] or ticketing authentication [kerberos] 14,302 bytes
Introduction to the Internet Protocols This is an introduction to the Internet networking protocols (TCP/IP). It includes a summary of the facilities available and brief descriptions of the major protocols in the family 30,737 bytes
The Hackers Handbook May be old, by an excellent read nontheless. Read it to understand the basics and a bit of hacker history 127,015 bytes

PORTSCANNING
Name
Description
Size
Practical Automated Detection Of Stealthy Portscans (PDF) Explains how to detect portscans. Although meant for people trying to protect their systems it explains some of the techniques portscanners use to remain undetected. 151,603 bytes
ICMP Usage In Scanning (PDF) Paper that describes what information can be gained from a target network using ICMP. Well written and DEFINATELY worth a read if you're a beginner. 434,372 bytes

WINDOWS NT
Name
Description
Size
The unofficial NT Hack FAQ Basics on NT security 44,622 bytes
Wardoc This document is an attempt by the Rhino9 team to document the methodology and techniques used in an attack on A NT based network. The intent of this document is to educate administrators and security professionals of both the mindset of an attacker and A large set of the current NT penetration techniques. This document attempts to follow in the footsteps of the classic text, "How To Improve The Security Of Your Site by Breaking Into It" by Dan Farmer and Wietse Venema. Obviously, this text will not contain all known methods for NT network penetration 28,388 bytes
Understanding Microsoft Proxy Server 2.0 This documented was not made for people who have been working with Microsoft Proxy Server since its beta (catapult) days. It is made for individuals who are curious about the product and security professionals that are curious as to what Microsoft Proxy Server has to offer. This document is also being written for individuals have a general idea of what a Proxy Server does, but wants to know more. This paper goes into discussion of Proxy Server Features and Architecture, Access Control, Encryption, and Firewall Strategies (which I have been getting a lot of requests for) 10,971 bytes
Analysis of the Security of Windows NT Interesting paper about Windows NT security (PDF) 417,510 bytes
A *REAL* NT Rootkit, patching the NT Kernel Nice tutorial that explains how to patch NT to do what you want it to do 17,304 bytes

VAX
Name
Description
Size
Vax Hacking FAQ The only file that I could find that deals singularly with VAXEN. So it'll have to do. Never used A VAX before, so I can't vouch for this file 21,823 bytes
A Practical Exercise in Securing an OpenVMS System This paper deals with securing VMS. As I've never uses OpenVMS I can't vouch for this one either 32,650 bytes

RAINBOW BOOKS
Colour
Description
Size
Aqua Glossary of Computer Security Acronyms 21,415 bytes
Blue Trusted Product Evaluation Questionnaire 18,197 bytes
Brown Guide to Understanding Trusted Facility Management 29,060 bytes
Burgendy A Guide To Understanding Design Documentation 20,543 bytes
Dark Lavender A Guide To Understanding Trusted Distribution in Trusted Systems 17,502 bytes
Green DoD Password Management Guideline 18,690 bytes
Grey TRUSIX Rationale for Selecting Access Control List Features For The Unix System 38,835 bytes
LightBlue A Guide To Understanding I & A 18,101 bytes
Orange DoD Trusted Computer System Evaluation Criteria 63,911 bytes
Another Orange A Guide To Understanding Configuration Management in Trusted Systems 42,462 bytes
Peach A Guide To Writing the Security Features User's Guide for Trusted Systems 16,576 bytes
Pink Rating Maintenance Phase Program 26,257 bytes
Purple Guidelines for Formal Verification Systems 17,667 bytes
Red Trusted Network Interpretation 246,679 bytes
Another Red Trusted Network Interpretation Environments Guideline 37,272 bytes
Venice Blue Computer Security Subsystems 18,251 bytes
Yellow Guide For Applying the DoD Trusted Computer System Evaluation Criteria In Specific Enviroments


Contents of this post are taken from http://www.xs4all.nl/~l0rd/hack.htm
21,420 bytes

1 comments

  1. ccie security bootcamp // August 7, 2012 at 11:58 AM  

    All the topic are fantastic and related to hackers.
    ethical hacking course in thailand