Sendmail Tutorial (version 2.4) - find out why Sendmail is called 'the buggiest daemon on earth'. Tons of ways to crack into big computers as well as PCs unleashed, including, of course, information on how to block these holes.
61d435cba5f7a1cc881d01bf9c93a9d62fef9cf6c8b8131d6a1b7dbf8b5a8a11
A guide to the Shiva LanRover networking platform, ppp connections, dialout modems etc, system configuration.
47814ac73410ffb0faa0055dba3300a21839a2bf6b863a2adf9b2a2873f9b1aa
brief article explaining different commands etc on the U.S Robotics NetServers which are becomming incresingly popular. These servers are an extreame sercutity risk to any network that uses them for network managment, they essentialy give whoever has administrator access _total_ control over its surrounding network.
d02357ba9581b3dad1b56ebeccdec08e451d1a441e354506566480a440a693f7
Playing with the Internet Daemons - There are many fun internet daemons that can be played with to give a fuller understanding of unix networking. Very well written.
65189f823bd35fa6726a9232af8ed50e9c670ee0b6f78bff4667aa4f60200d41
The Lost Art Of BBSing - Believe it or not, here in the year 2000 BBSing is not dead. Of course its not what it used to be, but its something for us who missed those days can look at and enjoy.
fadf0a36fd4b5fe43bb1c6adbb9d34b96c19170cd019a4b7532ffd48f185d971
Sometimes administrators put directories in robots.txt that they want to hide from the search engines, without securing the directory. Sometimes the directories in robots.txt have interesting things in them.
8cd25df885343c07873c734d6dff7a63f38d84a3bfe29d8a677a4592abd2db5d
A word document discussing the possibilities of defeating encryption programs such as PGP using LanMan under NT.
36075d5ad515b3cc6df89ff4093cd14678327dc9bfa487d7c98880cc7bd36e16
Proxies/Wingates/SOCKS Firewalls Tutorial (In German). Original by Jatt, translated /uebersetzt by I.RAM.S.
bb8b163d4cb8e2f941bbe2a4ad83ab2358daa09efbd8396e26418c18f4468442
The Eggdrop Bots Tutorial.
b55ec02f32787cf68bfbbaf6b87c9adfe2597cbbf7b0af47eb253ffd1ee6d7b7
Exploits Explained I: The New JavaScript Hole in Hotmail.
fefc92790c0e1f6582e99bee56576b24b1cdd804a4598c67b697503e22643fb8
AIX versions 4.1 ,4.x, and 3.x gethostbyname() and /bin/host local root exploit.
078223e0cc15496976e5f5eed3ccb736999f49d92b8b3f662506f6bccfa77725
An interesting interview with Aleph One, the moderator of the BugTraq mailing list.
53f65d1ad4fbd41bcdaa9a60f75c2f82b64020eccb6afb1d05e153dc839c443a
Stay anonymous on the web - How to maintain your anonymity on the web.
45ce2300d2627861d9d966d197426130d073d8fe43bf00fe2b5dd88b373c5a9e
There is a serious vulnerability in the cookies module of the Apache httpd, version 1.1.1 and earlier, which makes it possible for remote individuals to obtain access to systems running the Apache httpd. Only sites which enabled mod_cookies, a nondefault option, are vulnerable.
415bebb205840539ae2b17c5545d041bd57718a9f52efe06857b791f9e5cecfb
Text about hacking from your web browser by checking the PHF bug and some CGI bugs.
6083224d95d5acfbc20b146b869d6b1a8aa0534b55712a0e774946fd4dd73105
Beginners guide to hacking that includes an old sendmail exploit.
87d0317fbaeb10bddb3b2b64ca8a2d221634a3e1ed1626302e2c829983ded8cc
Brief paper discussing security on BSD.
026139f602cab91f6fcd3bacb81e14212d96e8ed84b28fb1d2ff8ebf56993d88
In research for our upcoming network auditing tool, SNI has uncovered a serious problem present in implementations of BIND which trust invalid data sent to them. This vulnerability specifically applies to hostname to address resolution and can result in local and remote users obtaining root privileges.
859f295eb53b572358085865ed77446854a85dd5a5cdb0284a0ee7123f66f271
This file will describe several techniques to acquire a password file just by using an ordinary web browser. The information provided will be best described for the beginner hacker, but all hackers should benefit from this information.
4e1a44d79d2b2e0654bfad6a83e62a6c7529e4e3650a189535b3b1585b2494ee
"Cyber-Christ meets Lady Luck" - With DEFCON is, read this excellent chronicle of Winn's trip to DEFCON II in Las Vegas.
33cea51066995a9c4847bebef2f4cd585fded0c560010eae2bc4ff9e5126d0b2
"Cyber Christ Bites The Big Apple" - We couldn't post Part I of the Cyber Christ series, HOPE (Hackers On Planet Earth) in New York City on August 13-14, 1994.
099356f6af4af41de108fa3400d8e38f3aad398d2c95043861a42482126e7c17
Write up called A Characteristic Model of Computer Criminals.
32f692c00f079b9d702d915057021bdd5d976ff420ef66c864e1f3c0f484691b
This is a whitepaper about countermeasures.
36fe0e8dc12ce485cc6068990770578278d4542695f3973f7cf9c747e625dfcb
Interesting text explaining how to cover your tracks when you leave the system.
d9c1e68a8518fff37df1b395e9629ff68524e7dd103307da1968cff4bcb1c288
SNI has become aware of serious problems relating to the handling of temporary files by the default BSD cron jobs /etc/security and later became aware of an equally serious problem in /etc/daily. In addition, the 4.4BSDlite2 version of /etc/security passes unchecked data to a shell. These bugs make it possible for unpriviliged users to obtain root access, EVEN IF THERE ARE NO SETUID PROGRAMS ON THE SYSTEM.
5ca61e56aee4ef540984270e547da4953f9f595ef2022006e71664ad9a93aa72