Click to Return to Index

THC BBS Archive CD-ROM

BOOKS.TXT
Computer Security Books 73_88
ACROYNYM.TXT
The IIRG Hackers' Acronym Chart
CAPTAINA.NWS
WHo is Captain Zap?
CIRCLEMS.TXT
Inner Circle Messages
ENA1.HAC
Explanation of ENA
GOODKIDS.HAC
Hackers are nice people...
HACETHIC.TXT
The Hacker's Ethics
HACK9.HAC
H.A.C.K. #9
HACKER01.DOC
Masters thesis on hackers
HACKER16.DOC
Hacker's atlas of the world
HACKERS.CRM
Are Computer Hackers criminals?
LONGPASS.TXT
How useful ARE longer passwords?
MAINFRAM.DOC
Numbers for some mainframes
MENACE.TXT
The Hacker Menace
MORALITY.HAC
Hacker Morality
MORHAKNM.TXT
Hack Numbers (more!)
NASA.HAK
The NASA Hackers
NIGHTHAK.TXT
Night of the Hackers
PHRKTUT.DOC
How to be a cautious hacker
PROLOCK.DOC
How to unprotect PROLOCK protections
REQUEST.GNU
Get your own, personal FSF account
RISKS.DOC
Advice on how not to get caught hacking
SATCON.TXT
Controlling the orbital dynamics of satellites!
SATELLIT.CPR
The Satellite Caper
SCANPRG.TXT
What to look for in a scan program
SNOOP.PHK
Data Snooping
SUNDEVIL.TXT
2600 Magazine's perspective on Sun Devil etc.
TACDIAL.TXT
TAC Dialups
TEQUILA.003
Wow! MORE Hacking OldMsgs
WASHLOD.TXT
An article on the LOD busts
WOZBABE.NWS
Wozniak is behind hacking
COMSEC.FAQ
Computer Security/Compromise FAQ
_HACK.FAQ
#Hack FAQ Beta .006
HACKING.101
Hacking 101
VTHACK1.TXT
Virginia Tech Hacking File 1
VTHACK2.TXT
Virginia Tech Hacking File 2
VTHACK3.TXT
Virginia Tech Hacking File 3
UKGUIDE.TXT
Guide to Online Systems in the U.K.
MOB.TXT
Hackers In The Mob?
FBICOMPU.TXT
FBI/Law Enforcment Computer Systems
BASICHAC.TXT
Basics of Hacking
DOWJONES.CMD
Dow Jones Commands
NHG.TXT
LOD/H Novice's Guide to Hacking, Dec.1988
WELL.MAN
Commands & Oper. Manual For THE WELL
NYT.TXT
New York Times Article On Phreak/Hacks
USRGUIDE.TXT
NIST Computer Users Guide - anti-hacking measures for the common user
PRIMER.TXT
Prevention Thru Recovery
SECURIT1.TXT
Computer Emer. Respose Team
MISCINFO
'PIRATE EASY' Telcom Hacking Info,Proto's,Security
INCIRCLE.TXT
Exerpts From The Inner Circle
ALT_SECU.FAQ
FAQ on Security
HACK.TXT
On Hacking (General)
STARLINK.TXT
Starlink Info/Index
VAS015.TXT
VAS #15: Merit/Michnet Hacking Issue
MULG3.TXT
"Miskatonic University Learning Guides" #3 - advice for beginning hackers
PKZIP.HAK
PKZip Hacking Update from Xenocide
SCANTRON.HAC
Agent Blue's known Scantron hacks
CARCODES.TXT
Hacking GM cars' onboard computer
SECURITY.TXT
Computer Security by E.A. Bedwell
GREENBK.TXT
The Green Book - Security Of Information Systems [European Community]
HK_ACCES.TXT
Logical Access Control
HK_I_A.TXT
Identification and Authentication
HK_POLIC.TXT
Computer and Information Security Policy
HK_PROGM.TXT
Security Program Management
JUL93BLT.TXT
CSL Bulletin - Connecting to the INTERNET: Security Considerations
NOIDCRYP.TXT
Security without Identification - a bibliographic reference
ORANGE.TXT
Department of Defense: Trusted Computer System Evaluation Criteria [The Orange Book]
PASSCH.TXT
How to choose secure passwords
CIACG17.TXT
CIAC G-17 March 12, 1996: Vulnerabilities in sample HTTPD CGIs
RUHACKER.TXT
Are you a Hacker? By ReDragon
BLUEBOOK.TXT
Trusted Computer System Evaluation Criteria - The DoD "Blue Book"
BRWNBOOK.TXT
Guide to Understanding Trusted Facility Management - The DoD "Brown Book"
DARKLAV.BOK
A Guide to Understanding Trusted Distribution in Trusted Systems, the DoD "Dark Lavender Book"
PURPLE.BOK
Guidelines for Formal Verification Systems, the DoD "Purple Book"
DENIAL.TXT
Introduction to Denial of Service
WANKWORM.TXT
The W.A.N.K. worm takes over NASA computers (1989)
FINDHOLE.TXT
Security Holes -- Q and A sheet of Security Holes 93/11/10
GCS.TXT
Government Security -- This file tells about Government
standards, and information concerning computer security.
INNERCIR.TXT
Hacking Techniques -- Various diffrent ways to take a run
at a system. Other then the normal expected ones.
GTMHH1_1.TXT
"Guide to Mostly Harmless Hacking"
Finger using Telnet -- I use this one all the time. It's a
very usefull tool to learn to use. # 1-1
GTMHH1_2.TXT
"Guide to Mostly Harmless Hacking"
Sending Fake E-mail -- This is mentioned in another one of
my files, but this puts it in easy terms for the newbie to understand. Plus
how to spot forgeries. # 1-2
GTMHH1_3.TXT
"Guide to Mostly Harmless Hacking"
Finger your way in -- A way to gain entrance to places
you're not suposed to be using the simple finger command! #1-3
GTMHH1_4.TXT
"Guide to Mostly Harmless Hacking"
Get Usenet spammers booted -- A way to get Spammers kicked
for their ISPs. # 1-4
GTMHH1_5.TXT
"Guide to Mostly Harmless Hacking"
Get E-mail spammers booted -- A way to get people who spam
with e-mail to get booted off their ISPs. # 1-5
GTMHH1_6.TXT
"Guide to Mostly Harmless Hacking"
How to deal with Offensive Web Sites -- I think the title
says it all! # 1-6
GTMHH2_1.TXT
"Guide to Mostly Harmless Hacking"
Internet hacks for dummies -- Unix gurus can skip this,
just a few good pointer and tricks for the newbie! # 2-1
GTMHH2_2.TXT
"Guide to Mostly Harmless Hacking"
Linux hacks -- A good system to get to know. It has a
little bit of everythign else in it. # 2-2
GTMHH2_3.TXT
"Guide to Mostly Harmless Hacking"
Intro to TCP/IP -- A good one for the Newbie again. A
basic introduction to what TCP/IP is all about. # 2-3
GTMHH2_4.TXT
"Guide to Mostly Harmless Hacking"
TCP/IP continued -- The second part to the last on on TCP/IP.
Deals with Port Surfing and getting in other peoples systems
without getting thrown in the clink! # 2-4
GTMHH3_1.TXT
"Guide to Mostly Harmless Hacking"
E-mail Bombing -- What to do when you get bombed. Don't
take revenge but get even within the law! # 3-1
GTMHH3_2.TXT
"Guide to Mostly Harmless Hacking"
Mapping the Net -- Some more Unix commands that can help you
"map" the net effectivly. Nslookup, Traceroute, Whois, etc.
#3-2
GTMHH.TXT
"Guide to Mostly Harmless Hacking"
Know the Law -- This is very good reading for anyone who might
have some concerns about the law. It covers where to go to
find out what you need to know, and has a brief overview of
the federal laws that concern hacking.
SECURICK.TXT
How to Improve your Security -- This is a paper from Sun
MicroSystems, on how to break into a system, so you'll know
where your system's holes are. Perfect for use on the "other"
end........heh heh heh......
THEHGOD.FAQ
The God of H Hacking
FIREWALL.FAQ
Firewalls FAQ
HIREHACK.TXT
Hiring a Hacker
HANDBOOK.TXT
The Hacker's handbook (1985)
CERT0001.TXT
CERT Advisory CA-88:01 ftpd hole
CERT0002.TXT
CERT Advisory CA-89:01 passwd hole
CERT0003.TXT
CERT Advisory CA-89:02 sun restore hole
CERT0004.TXT
CERT Advisory CA-89:03 telnet breakin warning
CERT0005.TXT
CERT Advisory CA-89:04 decnet wank worm
CERT0006.TXT
CERT Advisory CA-89:05 ultrix3 0 hole
CERT0007.TXT
CERT Advisory CA-89:06 ultrix3 0 update
CERT0008.TXT
CERT Advisory CA-89:07 sun rcp vulnerability
CERT0009.TXT
CERT Advisory CA-90:02 intruder warning
CERT0010.TXT
CERT Advisory CA-90:03 unisys warning
CERT0011.TXT
CERT Advisory CA-90:04 apollosuid vulnerability
CERT0012.TXT
CERT Advisory CA-90:05 sunselection vulnerability
CERT0013.TXT
CERT Advisory CA-90:06a NeXT vulnerability
CERT0014.TXT
CERT Advisory CA-90:07 VMS ANALYZE vulnerability
CERT0015.TXT
CERT Advisory CA-90:08 irix mail
CERT0016.TXT
CERT Advisory CA-90:09 vms breakins warning
CERT0017.TXT
CERT Advisory CA-90:10 attack rumour warning
CERT0018.TXT
CERT Advisory CA-90:11 Security Probes
CERT0019.TXT
CERT Advisory CA-90:12 SunOS TIOCCONS vulnerability
CERT0020.TXT
CERT Advisory CA-91:02a SunOS telnetd vulnerability
CERT0021.TXT
CERT Advisory CA-91:03 unauthorized password change request
CERT0022.TXT
CERT Advisory CA-91:04 social engineering
CERT0023.TXT
CERT Advisory CA-91:05 Ultrix chroot vulnerability
CERT0024.TXT
CERT Advisory CA-91:06 NeXTstep vulnerability
CERT0025.TXT
CERT Advisory CA-91:07 SunOS source tape vulnerability
CERT0026.TXT
CERT Advisory CA-91:08 systemV login vulnerability
CERT0027.TXT
CERT Advisory CA-91:10a SunOS lpd vulnerability
CERT0028.TXT
CERT Advisory CA-91:11 Ultrix LAT-Telnet gateway vulnerability
CERT0029.TXT
CERT Advisory CA-91:12 Trusted Hosts Configuration vulnerability
CERT0030.TXT
CERT Advisory CA-91:14 IRIX mail vulnerability
CERT0031.TXT
CERT Advisory CA-91:15 NCSA Telnet vulnerability
CERT0032.TXT
CERT Advisory CA-91:17 DECnet-Internet Gateway vulnerability
CERT0033.TXT
CERT Advisory CA-91:18 Active Internet tftp Attacks
CERT0034.TXT
CERT Advisory CA-91:19 AIX TFTP Daemon vulnerability
CERT0035.TXT
CERT Advisory CA-91:21 SunOS NFS Jumbo and fsirand
CERT0036.TXT
CERT Advisory CA-91:23 Apollo crp vulnerability
CERT0037.TXT
CERT Advisory CA-92:01 NeXTstep configuration vulnerability
CERT0038.TXT
CERT Advisory CA-92:02 Michelangelo PC virus warning
CERT0039.TXT
CERT Advisory CA-92:03 Internet Intruder Activity
CERT0040.TXT
CERT Advisory CA-92:04 ATT rexecd vulnerability
CERT0041.TXT
CERT Advisory CA-92:05 AIX REXD Daemon vulnerability
CERT0042.TXT
CERT Advisory CA-92:06 AIX uucp vulnerability
CERT0043.TXT
CERT Advisory CA-92:07 AIX passwd vulnerability
CERT0044.TXT
CERT Advisory CA-92:08 SGI lp vulnerability
CERT0045.TXT
CERT Advisory CA-92:09 AIX anonymous ftp vulnerability
CERT0046.TXT
CERT Advisory CA-92:10 AIX crontab vulnerability
CERT0047.TXT
CERT Advisory CA-92:11:SunOS Environment vulnerability
CERT0048.TXT
CERT Advisory CA-92:13 SunOS NIS vulnerability
CERT0049.TXT
CERT Advisory CA-92:14 Altered System Binaries Incident
CERT0050.TXT
CERT Advisory CA-92:15 Multiple SunOS vulnerabilities patched
CERT0051.TXT
CERT Advisory CA-92:18 VMS Monitor vulnerability update
CERT0052.TXT
CERT Advisory CA-92:19 Keystroke Logging Banner Notice
CERT0053.TXT
CERT Advisory CA-92:20 Cisco Access List vulnerability
CERT0054.TXT
CERT Advisory CA-92:21 ConvexOS vulnerabilities
CERT0055.TXT
CERT Advisory CA-93:01 REVISED HP NIS ypbind vulnerability
CERT0056.TXT
CERT Advisory CA-93:02a NeXT NetInfo writers vulnerabilities
CERT0057.TXT
CERT Advisory CA-93:03 SunOS Permissions vulnerability
CERT0058.TXT
CERT Advisory CA-93:04a Amiga finger vulnerability
CERT0059.TXT
CERT Advisory CA-93:05 OpenVMS AXP vulnerability
CERT0060.TXT
CERT Advisory CA-93:06 wuarchive ftpd vulnerability
CERT0061.TXT
CERT Advisory CA-93:07 Cisco Router Packet Handling vulnerability
CERT0062.TXT
CERT Advisory CA-93:08 SCO passwd vulnerability
CERT0063.TXT
CERT Advisory CA-93:10 anonymous FTP activity
CERT0064.TXT
CERT Advisory CA-93:11 UMN UNIX gopher vulnerability
CERT0065.TXT
CERT Advisory CA-93:12 Novell-login-exe-vul
CERT0066.TXT
CERT Advisory CA-93:12 Novell LOGIN EXE vulnerability
CERT0067.TXT
CERT Advisory CA-93:13 SCO Home Directory Vulnerability
CERT0068.TXT
CERT Advisory CA-93:14 Internet Security Scanner
CERT0069.TXT
CERT Advisory CA-93:15 SunOS and Solaris vulnerabilities
CERT0070.TXT
CERT Advisory CA-93:17 xterm logging vulnerability
CERT0071.TXT
CERT Advisory CA-93:18 SunOS Solbourne loadmodule modload vulnerability
CERT0072.TXT
CERT Advisory CA-93:19 Solaris Startup vulnerability
CERT0073.TXT
CERT Advisory CA-94:01 network monitoring attacks
CERT0074.TXT
CERT Advisory CA-94:01 ongoing network monitoring attacks
CERT0075.TXT
CERT Advisory CA-94:02 REVISED SunOS rpc mountd vulnerability
CERT0076.TXT
CERT Advisory CA-94:03 AIX performance tools
CERT0077.TXT
CERT Advisory CA-94:05 MD5 checksums
CERT0078.TXT
CERT Advisory CA-94:06 utmp vulnerability
CERT0079.TXT
CERT Advisory CA-94:07 wuarchive ftpd trojan horse
CERT0080.TXT
CERT Advisory CA-94:08 ftpd vulnerabilities
CERT0081.TXT
CERT Advisory CA-94:09 bin-login-vul
CERT0082.TXT
CERT Advisory CA-94:09 bin login vulnerability
CERT0083.TXT
CERT Advisory CA-94:10 IBM AIX bsh vulnerability
CERT0084.TXT
CERT Advisory CA-94:11 majordomo vulnerabilities
CERT0085.TXT
CERT Advisory CA-94:13 SGI IRIX Help Vulnerability
CERT0086.TXT
CERT Advisory CA-94:14 trojan horse in IRC client for UNIX
CERT0087.TXT
CERT Advisory CA-94:15 NFS Vulnerabilities
CERT0088.TXT
CERT Advisory CA-95:01 IP spoofing
CERT0089.TXT
CERT Advisory CA-95:01 IP spoofing attacks and hijacked terminal connections
CERT0090.TXT
CERT Advisory CA-95:02 binmail vulnerabilities
CERT0091.TXT
CERT Advisory CA-95:03a telnet encryption vulnerability
CERT0092.TXT
CERT Advisory CA-95:04 NCSA http daemon for unix vulnerability
CERT0093.TXT
CERT Advisory CA-95:06 satan
CERT0094.TXT
CERT Advisory CA-95:07a REVISED satan vul
CERT0095.TXT
CERT Advisory CA-95:08 sendmail v 5 vulnerability
CERT0096.TXT
CERT Advisory CA-95:09 Solaris-ps vul
CERT0097.TXT
CERT Advisory CA-95:09 Solaris ps vul
CERT0098.TXT
CERT Advisory CA-95:10 ghostscript
CERT0099.TXT
CERT Advisory CA-95:12 sun loadmodule vul
CERT0100.TXT
CERT Advisory CA-95:13 syslog vul
CERT0101.TXT
CERT Advisory CA-95:14 Telnetd Environment Vulnerability
CERT0102.TXT
CERT Advisory CA-95:15 SGI lp vul
CERT0103.TXT
CERT Advisory CA-95:16 wu-ftpd vul
CERT0104.TXT
CERT Advisory CA-95:17 rpc ypupdated vul
CERT0105.TXT
CERT Advisory CA-95:18 widespread attacks
CERT0106.TXT
CERT Advisory CA-96.01 UDP service denial
CERT0107.TXT
CERT Advisory CA-96.02 bind
CERT0108.TXT
CERT Advisory CA-96.03 kerberos 4 key server
CERT0109.TXT
CERT Advisory CA-96.04 corrupt info from servers
CERT0110.TXT
CERT Advisory CA-96.05 java applet security mgr
CERT0111.TXT
CERT Advisory CA-96.06 cgi example code
CERT0112.TXT
CERT Advisory CA-96.07 java bytecode verifier
CERT0113.TXT
CERT Advisory CA-96.08 pcnfsd
CERT0114.TXT
CERT Advisory CA-96.09 rpc statd
CERT0115.TXT
CERT Advisory CA-96.10 nis+ configuration
CERT0116.TXT
CERT Advisory CA-96.11 interpreters in cgi bin dir
CERT0117.TXT
CERT Advisory CA-96.12 suidperl vul
CERT0118.TXT
CERT Advisory CA-96.13 dip vul
CERT0119.TXT
CERT Advisory CA-96.14 rdist vul
CERT0120.TXT
CERT Advisory CA-96.15 Solaris KCMS vul
CERT0121.TXT
CERT Advisory CA-96.16 Solaris admintool vul
CERT0122.TXT
CERT Advisory CA-96.17 Solaris vold vul
CERT0123.TXT
CERT Advisory CA-96.18 fm fls
CERT0124.TXT
CERT Advisory CA-96.19 expreserve
CERT0125.TXT
CERT Advisory CA-96.20 sendmail vul
CERT0126.TXT
CERT Advisory CA-96.21 tcp syn flooding
CERT0127.TXT
CERT Advisory CA-96.22 bash vuls
CERT0128.TXT
CERT Advisory CA-96.23 workman vul
CERT0129.TXT
CERT Advisory CA-96.24 sendmail daemon mode
CERT0130.TXT
CERT Advisory CA-96.25 sendmail groups
CERT0131.TXT
CERT Advisory CA-96.26 ping
CERT0132.TXT
CERT Advisory CA-96.27 hp sw install
CERT0133.TXT
CERT Advisory CA-97.01 flex lm
CERT0134.TXT
CERT Advisory CA-97.02 hp newgrp
CERT0135.TXT
CERT Advisory CA-97.03 csetup
CERT0136.TXT
CERT Advisory CA-97.04 talkd
CERT0137.TXT
CERT Advisory CA-97.05 sendmail
CERT0138.TXT
CERT Advisory CA-97.06 rlogin-term
CERT0139.TXT
CERT Advisory CA-97.07 nph-test-cgi script
CERT0140.TXT
CERT Advisory CA-97.08 innd
CERT0141.TXT
CERT Advisory CA-97.09 imap pop
CERT0142.TXT
CERT Advisory CA-97.10 nls
CERT0143.TXT
CERT Advisory CA-97.11 libXt
CERT0144.TXT
CERT Advisory CA-97.12 webdist
CERT0145.TXT
CERT Advisory CA-97.13 xlock
CERT0146.TXT
CERT Advisory CA-97.14 metamail
CERT0147.TXT
CERT Advisory CA-97.15 sgi login
CERT0148.TXT
CERT Advisory CA-97.16 ftpd
CERT0149.TXT
CERT Advisory CA-97.17 sperl
CERT0150.TXT
CERT Advisory CA-97.18 at
CERT0151.TXT
CERT Advisory CA-97.19 bsdlp
CERT0152.TXT
CERT Advisory CA-97.20 javascript
REDBOOK.TXT
DoD Red Book: Password Management Guideline
CERT_M_1.TXT
ABBREVIATED CERTIFICATION METHODOLOGY FOR SENSITIVE INFORMATION TECHNOLOGY SYSTEMS
NCSC_OAS.TXT
NCSC Guideline on Office Automation Security
NIST_PRT.TXT
NIST Computer User's Guide to the Protection of Information Resources
AUDITOOL.TXT
Intrusion Detection in Computers
EVALUATS.TXT
Trusted Product Evaluation Questionnaire
HACKSERV.TXT
Hacking Servers: a Beginner's Guide by Lord Dredd
DOWJONES.TXT
Inside Dow Jones News Service
WINHACK.TXT
An easy Win hack
DHCPFAQ.TXT
DCHP (Dynamic Host Configuration Protocol) FAQ
VIXIE96.TXT
SNI Security Advisory - Vulnerability in Vixie cron (96/12/16)
VMADMIN.TXT
A Guide to Administration on VMan Systems, by Sire and Psyclone (UK) (1995)
UEBER.TXT
Becoming an Uebercracker, and thus, an ueberadmin to stop crackers
TROJAN.TXT
A trojan in BASIC by Spear
BACKDOOR.C
A backdoor in 3 lines of code! C source
VAS117.TXT
VAS 117: The Death of Hacking
FORDCRED.9X
9x Presents Ford Credit-Net Issue 0001
SECURID.9X
9x Presents Info on SecureID Issue 0002
9X_HP3.TXT
Haqing HP3000's Written by: Onethought
9X_STYLE.TXT
LocalHacking vs. NetHacking by GrampaElite
MAGIC_CO.TXT
Cracking the MIT-MAGIC-COOKIE-1 Authorization protocol
MONGEL.MSG
Old Hack messages from P-80
RISCOS_R.EXP
Access the shadow passwd file on a Riscos machine
STARTHAK.TXT
The Ultimate Beginners Guide to Hacking and Phreaking by Revelation/LOA (96/08)
C_LESSON.ZIP
C Language Programming Course
MS_IIS.TXT
The Microsoft IIS Bug
MS_IS.TXT
Microsoft Index Server exposes IDs and passwords
MSACCESS.TXT
MS Access Magic 8-Ball Trick
NEWBIE.TXT
Ultimate Step by Step Guide to Become a Hacker
TOP10.PWD
The top 10 passwords...
MESSCOMP.TXT
Messing with someone's computer - by Archangel
HACKLINK.TXT
Links to Hacking Information
SKEY.TXT
Description of the S/KEY One-time password system
SKEYFLAW.TXT
Vulnerabilities in the S/KEY One-time password system
DIALOUT1.TXT
Novice Manual On Using Outdial Modems by Blue Adept
HACKHOLL.TXT
Hacking in Holland
INNERC.TXT
Blindman's Bluff, Hacker Style

Click to Return to Index