Do also visit my main hacking page!!
If you want, you can meet me in IRC. Usually between 9 and 12 pm, our local time.
It is +1 hour from Greenwitch time!
You'll find me on NEWNET! Try any of these servers:
irc.internet.no
server3d.nrk.no
The channel is: #Hack_The_World or #Funfactory
Remember, you can allways contact me through ICQ on UIN 2605449!
Hacking Files
UCF Has done it again, the Best Cracking group brings you the FASTEST Passwd hacker yet! For Dos!
NFS Tracing By Passive Network Monitoring Spying on ethernet traffic to gain information on NFS filesystem activity.
Crontab Exploit Takes advantage of a buffer overflow problem.
Internet Email Security A good discussion of sendmail and some of its basic flaws.
Smashing the Stack for Fun and Profit Excellent article explaining buffer overflows.
Vax/VMS basics A FAQ for new users of Vax/VMS systems, good for beginners.
Hacking VAX Informative file on security protocols and measures on VMS.
How to Find Security Holes Concepts in finding security breaches, mainly in software code.
Social Engineering Exploiting human weakness-tricking people into revealing sensitive information.
Hole List lengthy compilation of security holes.
Denial Of Service Unethical but I included it for informational purposes, it explains how to flood services, crash servers, etc.
Hacking Techniques A VERY basic text file describing a few simple tricks.
The Internet Worm Explains exactly what happened and how it worked.
The Risks of Key Recovery, Key Escrow, and Trusted Third-Party EncryptionAn excellent article on modern cryptography.
Getting Information Some methods of gaining information about people.
Cracking the UPC Explanation of the barcoding system.
Phreaking
Cracking
Box Schemes
BBS Hacking
Archive Crackers
Keystroke Recorders
Nukers/Sniffers/Spoofers/Flooders/Port Scanners/ICQ
Hak Tek bomb, scan ip
PortPro Very good port scanner
EyeDent Spoofer (202 kb) EyeDent spoofer allows you to fake your username on any ident request. like ftp sessions, telnet sessions, irc sessions (is a telnet session anways) from windows.
Port Listen Listens a port to see if anyone is trying to nuke you
WinGenocide-Nukes multiple IP's at once!
Mass Nuker-The more the better!
Liquid Nuker-Works well!
ICQ
XiCQ Advanced Icq Chat Functions
ICQ Nuker Nukes Someone's ICQ Using IP
ICQ Hacker Havn't Had Time To Figure Out
XiCQ Advanced ICQ chat functions. *2nd site*
ICQ Nuker Scans for the correct port then shuts down the victims
ICKiller Will bomb ICQ causing it to crash.
IFuckQ
ICQ Zap ICQ Nuker for dos
ICnewQ Can spoof messages, bomb, and kill ICQ.
ICQ DeFlooder Clears the messages sent after you have been bombed.
ICQ Bomb Squad Same as above.
ICQ SWAT Same
ICQ Protector While open this program protects you from being bombed.
ICQ Port Sniff!
ICQ Protect
ICQ Source UIN Spoofer
Mail Bombers
Avalanche 3.5 Good one
Anonymous E-Mailer amail 1.10
Wardialers
Novell Netware
The Novell Netware Hack-FAQ A good resource on basic Netware security.
Passwd Crackers/Dictionary Files
Cracker Jack Unix Passwd Cracker
UIUC Wordlists Archives
Internet Hacking
How Kevin Mitnick hacked Tsutomu Shimomura with an IP sequence attack Very interesting, requires a knowledge of TCP/IP to understand.
Source Routing An explanation of source-routing in conjunction with an IP spoofing attack and other situations.
IP Addressing Information on the format of IP addresses, interesting but not for newbies.
TCP/IP Weaknesses Flaws in BSD's protocol software.
Simple Active Attack Against TCP/IP Rerouting TCP data streams to bypass authentication protocols such as kerberos.
DHCP FAQ A thorough guide to the Dynamic Host Configuration Protocol
Ethernet FAQ FAQ of Ethernet terminology.
Tymnet Hacking Brief notes on hacking the Tymnet network .
Telenet: The Secret ExposedA very thorough guide to using/hacking Telenet.
Packet Switched NetworksA guide to Sprintnet and similar networks
Security/Encryption
Guides
gtmhh1-1 Introduction to hacking, description of telnet, and introduction to port surfing
gtmhh1-2 Forging Email 101, and how to spot and track forgeries
gtmhh1-3 Elaboration on finger, and lesson on fingering through telnet
gtmhh1-5 How to fight Email spammers
gtmhh1-6 How to get offensive web pages taken off the Web
gtmhh2-2 Introduction to Linux
gtmhh2-3 Explanation of Win95 ping exploit, AKA "killer ping attack" and also just a basic introduction to ping
gtmhh2-4 Elaboration on port surfing, and definition of daemons
gtmhh3-1 How to keep from being Email bombed, and how to recover if you get bombed
gtmhh3-2 How to map the Internet
gtmhh3-3 How to protect yourself on IRC
Number One
Number One
Number Two Hacking from/into wind0ze
Number Two Part Two
Number Two Part Three
AOL Proggies
ICP final: Great!!
PePsi4.0 Another great prog! A MUST DOWNLOAD! Rating:9 1/2
Pepsi 4.0 Great program almost as good as Fate
AOHell 1.16 Mb
AOLPRoGS BOARDs *Post Proggiez/Filez u need in here....
AOLPRoGS CHaT
Unix
Red Hat Linux
Debian
Slackware Linux
MkLinux (Linux for Macs)
Linux Installation HowTo
Linux FAQ
Linux Information Sheet
Windows95 Linux Boot Loader
Hacking tips for UNIX A description of a few small hacks
Improving the Security of Your Site By Breaking Into It
A UNIX Hacking Tutorial One of the best UNIX tutorials out there
COPS & Robbers-UNIX System Security An outline of analyzing a UNIX system's security with the COPS program.
UNIX Security Checklist Outlines common errors in administration and general
Unix System V How to hack UNIX System V
UNIX Backdoors How to hold on to root.
Hacking UNIX Basic tutorial of UNIX security.
Bourne Programming A thorough shell programming manual.
Crash Course in X Windows Security Explains the security risks of X Windows including screen capturing.
The SMTP Protocol A complete description of the Simple Mail Transfer Protocol
Sendmail 8.6.4 Bug Security hole that allows user to get root shell
Visual Basic Runtimes, DLLs, VBXs, etc
Visual Basic 5 Runtimes *YOU NEED THESE FILES FOR BOMBERS/NUKERS/ICQ NUKERS* Includes: MSVBVM50.DLL, OLEPRO32.DLL, OLEAUT32.DLL, ASYCFILT.DLL, COMCAT.DLL, STDOLE2.TLB.
http://www.smart.is/pub/Runtime-dll-Vb1-4/VB4/?plain -- A library of VisBasic runtime .dll's which you'll need to run UpYours! 2.0 and possibly some of the others. Don't get all of them--the program will tell you which ones you need when you run it for the first time after installing it.
Misc. Hacking
Hacking Tools
Hide files in GIF files and get them out again
Some unspecified files!!
Tell me if you know these files!!
a_bomb.zip
a_dial.zip
aio5.zip
alliance.zip
amail.zip
anarch.zip
arpanet1.zip
arpanet2.zip
arpanet3.zip
arpanet4.zip
atomic.zip
autovon1.zip
autovon2.zip
autovon3.zip
basicnet.zip
bhacking.zip
bhbb1.zip
bhbb2.zip
bhbb3.zip
bioc.zip
bluedial.zip
board.zip
bomb.zip
bootl_6.zip
bootl_7.zip
boxes.zip
breakin.zip
brute20.zip
bumpbeep.zip
bustlod.zip
bwash.zip
callcard.zip
cardchek.zip
cbrsp_1.zip
cdugd_1.zip
chahelp_.zip
changer_.zip
chemclas.zip