======== Newsgroups: alt.2600,alt.2600.hackerz,alt.hacker Subject: Newbies: Links to Hacking (and other) Information .. From: root@127.0.0.1 (-Symbiotic_) Date: 17 Feb 1998 12:26:01 -0700 This whole post is to contribute to getting this newsgroup back on track. Or at least to try. The natives are getting a bit restless with people coming in here and /blindly/ asking for cracks, wares, viruses, how to find people and other such things that do /not/ apply here or could be found with a little effort. This will be posted bi weekly on the days of Tuesday and Friday and will be posted to the following groups: alt.2600, alt.2600.hackerz, and alt.hacker. A few basic newsgroup etiquette notes before we get down to the nitty gritty. [Begin Newsgroup Notes:] 1. Before you ask for a software patch, a virus or anything else that doesn't apply here or could be found by yourself with some time and effort - READ THIS!! If this posting doesn't get you going in the right direction, then I apologize but there is absolutely nothing anyone in this group can do for you except maybe give you the name of a decent psychologist. 2. If you are going to make a test post, do NOT post it here. Why?? Because this is not the newsgroup to practice your posting abilities. There is a group devoted especially to this. It's called alt.test. Imagine that... 3. This is NOT alt.2600.archangel so please keep your conspiracy theory related posts out of here. If you think you have information that reveals who Archangel is keep it to yourself or better yet - post these types of messages and any other Archangel related messages to alt.2600.archangel. 4. Don't ask anyone to teach you how to hack. Hacking is a very time consuming art which cannot be taught via email courses. It is a process that has to be learned by an individual in a span of many years. Its not a cookie cutter subject that can be spoon fed to you. If you believe that it is, then I would suggest choosing an alternative life style. 5. Mailbombing and/or nuking is /not/ hacking despite what you think or what you have been told. If you feel the need to mail bomb or nuke someone, please leave as we don't want any part of it. 6. Check out Harlequin's posting, "How to Hack - Info for Newbies" which is posted biweekly as well. [:End Newsgroup Notes] /*Hacking related This section contains links to find various hacking related material. If you are looking for anything else such as software patches, wares, phreaking and/or information on how to find people, then scroll down the page. http://symbiotic.home.ml.org (Newbie hackers program) http://www.ftech.net/~monark/crypto/ (Beginners Guide to Cryptography) http://www.2600.com (The official 2600 magazine site) http://www.netscope.net/~icepick/cool2.html (A list of hacking links) http://www.phrack.com (The official Phrack magazine site) http://www.cybercom.com/~bsamedi/hack.html (Computer Underground) http://www.hacked.net (Up to date technical information) http://www.techbroker.com/happyhacker.html (Happy Hacker's Digest) http://www.rootshell.com (Rootshell site) http://www.aracnet.com/~gen2600/ (Genocide 2600) http://www.l0pht.com (The official Lopht Heavy Industries site) http://www.thecodex.com/hacking/ (Hacking information, links, utils) ftp://ds.internic.net/rfc/ (IntetNic's RFC FTP site) http://www.sysone.demon.co.uk/ (FAQ's, Newbies, and mailing lists) http://www.thtj.com (The Havoc Technical Journal) /*Shell accounts Free shell accounts: http://www.cyberspace.org (Minimal disk space, but decent practice environment) http://sdf.lonestar.org (5MB disk space, <10-20 w/donation> decent constrictions, but slooooooooooooooooow) http://godson.home.ml.org (An up to date list of free shell account servers. Most of them want an essay.) /*Mailing lists Security related mailing lists: http://www.ntsecurity.net/ (Subscribe to the NTSecurity list w/the on- line sign up page) Alert - Send an email to request-alert@iss.net with the following in the body of the message - Subscribe alert BugTraq - Send an email to LISTERV@NETSPACE.ORG with the following in the body of the message - SUBSCRIBE BUGTRAQ Cert - Send an email to cert-advisory-request@cert.org with the following in the subject line - SUBSCRIBE your-email-address FreeBSD Hackers Digest - Send an email to Majordomo@FreeBSD.ORG with the following in the body of the message - subscribe freebsd-hackers-digest /*Anonymity on the web I'm not positive that all these proxies will work, but it's the ones I found. Most of them support FTP, Gopher and HTTP requests: proxy.ak.iconz.co.nz:8080 proxy.wn.iconz.co.nz:8080 proxy.pm.iconz.co.nz:8080 proxy.tg.iconz.co.nz:8080 proxy.ch.iconz.co.nz:8080 proxy.ro.iconz.co.nz:8080 proxy.na.iconz.co.nz:8080 proxy.nn.iconz.co.nz:8080 gargoyle.apana.org.au:3128 proxy.magnusnet.com:8080 (or 8085, 8086, 8088) proxy.third-wave.com:3128 supernova.netscape.com:8080 access.adobe.com:8080 server.librarysafe.com:8080 wwwcache.mcc.ac.uk:3128 www.anonymizer.com:8080 (Slow connection w/pop up banner) http://search.yahoo.com/search?p=ip+spoofing (Find out how to spoof on your own) /*Operating System related Linux/Unix related sites: http://www.freebsd.org (Official FreeBSD site) http://www.hawken.edu/help/linux.htm (Quick guide to Linux commands) http://sunsite.unc.edu/mdw/index.html (Linux Documentation Project) http://www.linux.org (Official Linux site) http://www.ghg.net./crolmstrom/linux.html#archive (Linux beginners page) WindowsNT related sites: http://www.nmrc.org/files/nt/ (Nomad Research Centre) http://www.asmodeus.com (NT related files) http://www.ntsecurity.net (NTSecurity's site) /*Programming related C/C++ related sites: http://www.cm.cf.ac.uk/Dave/C/CE.html http://www.delorie.com/djgpp/ (FREE DOS C compiler) http://www.strath.ac.uk/CC/Courses/NewCcourse/ccourse.html http://www.programmersheaven.com (Various programming lang. info.) /*Reading materials Can't afford to buy books like "Unix Unleashed" ?? http://www.mcp.com/personal/ (This is MacMillan Publishing's official site where you can 'check out' 5 books for 90 days each. They offer books such as "Unix Unleashed", "Linux System Administrator's Survival Guide", "Teach Yourself TCP/IP in 14 Days", and "Red Hat Linux Unleashed". Just choose the books that you want to 'check out', then save each chapter to file on your HD. You won't get the pretty glossy cover, but you have the text. And, it's not the widest variety to choose from, but it works if you can't afford the $50+ for a book right now.) /*A few people have asked about the following post from Osiris, and I have yet to see it reposted by anyone else (including Osiris), so this next section contains the article posted by Osiris awhile back on how to begin hacking. Some of these URLs are broken, so just use your common sense to reattach them in your browser .. 1. Get Linux or FreeBSD ASAP 2. Acquire one or more books written by Spafford, Bellovin, Cheswick, Rubin, or Ranum 3. Get both the Camel and Llama books on PERL 4. Get ORA's book on TCP/IP 5. Purchase some old boxes (386/486) and install network cards Armed with these items, construct a small UNIX network within your home (garage, perhaps?). If you choose LINUX, read all the HOWTOs, particularly the networking HOWTO. Create at least 5 user accounts, allowing at least shell access for each account on each box. Once this configuration has been established (with all networking up and working properly), make attempts (as various users) to break one or more boxes on the system. (You should ideally attack various services, not just one.) Also: download either the SAFEsuite demo, the old ISS, or SATAN. Run these utilities against your system, and read the tutorials that accompany the documentation provided with these utilities. Next, acquire all tools located at this URL: http://www.giga.or.at/pub/hacker/unix Learn how to use each one. Next, obtain the AUSCERT UNIX security checklist here: ftp://ftp.auscert.org.au/pub/auscert/papers/unix_security_checklist Next, obtain the UNIX security checklist located here: http://stimpy.cac.washington.edu/~dittrich/R870/security-checklist.html Next, obtain the Site Security Handbook (RFC 1244), which is here: http://stimpy.cac.washington.edu/~dittrich/R870/rfc1244.txt Next, obtain this document from SRI: http://stimpy.cac.washington.edu/~dittrich/R870/SRI-Whitepaper.ps After reading and understanding all accompanying documentation listed above (and trying out some or all of the cited tools), read the following documents: Intrusion Detection Checklist ftp://info.cert.org/pub/tech_tips/intruder_detection_checklist Dan Farmer's Survey on Various Hosts: http://www.trouble.org/survey/ Improving the Security of Your Site by Breaking Into it http://www.trouble.org/security/admin-guide-to-cracking.html All the papers on this page, but especially the work by Nancy Cook and her partner. http://www.trouble.org/security/auditing_course/ Murphy's law and computer security by Wietse Venema http://www.trouble.org/security/murphy.html After absorbing that information, then seek out these papers: CIAC-2308_Securing_Internet_Information_Servers.pdf http://ciac.llnl.gov/ciac/documents/CIAC- 2308_Securing_Internet_Information_Servers.pdf Securing X Windows http://ciac.llnl.gov/ciac/documents/CIAC-2316_Securing_X_Windows.pdf How to Detect an Intrusion http://ciac.llnl.gov/ciac/documents/CIAC- 2305_UNIX_Incident_Guide_How_to_Detect_an_Intrusion.pdf Finally, go here and begin the process of studying each hole addressed in the BUGTRAQ archive. That is located here: http://www.geek-girl.com/bugtraq/search.html Other things that will help you tremendously are these: 1. Subscribe to all known mailing lists on UNIX security, e.g. BUGTRAQ, CIAC, CERT, etc. 2. From these lists, generate a database of email addresses of known security experts. Good examples would be Farmer, Venema, Spafford, Ranum, etc. 3. Scour the Internet for any instances of their email addresses - whether on lists, discussion groups or the web generally. (Note: do *NOT* bug these guys. Simply read their thoughts and ideas, absorb them, and move on.) 4. As you encounter exploit code on these lists (which you invariably will), compile it and execute it. Record your results. (One good reason to get LINUX or FreeBSD: all compilers are free and already well configured on a full install.) 5. Try to spend one hour a day studying socket programming. 6. Go to a used bookstore and buy every book you can find on system administration. In lieu of this, at least buy books that are in remaindering bins. The cheaper, the better. 7. Don't laugh, but learning at least the basics of these languages would help: A. PERL B. AWK/GAWK/NAWK C. SED D. Expect Also, it would be of some help to get a translation table that shows variances between similar or identical tasks performed in sh/bash/csh. In addition, you may wish to seek out the differences between disparate versions of UNIX. It is worth buying old manuals for AIX, HP-UX, Unicos, IRIX, Data General, SunOS, Solaris, XENIX, SYS V, and so forth. What follows is a list of books that might help you. (These are in alphabetical order, so order does not indicate preference. Personally, I prefer books authored by those I cited above.) Building Internet Firewalls D. Brent Chapman, Elizabeth D. Zwicky (1995) ISBN: 1565921240 Commonsense Computer Security: Your Practical Guide to Information Protection Martin R. Smith (1994) ISBN: 0077078055 Computer Crime: A Crimefighter's Handbook David J. Icove, David, Seger, Karl Icove, Karl A. Seger, Vonstorch (1995) ISBN: 1565920864 Computer Security John M. Carroll (1996) ISBN: 0750696001 Computer Security Basics Deborah Russell, G.T. Gangemi (1991) ISBN: 0937175714 Computer Security Handbook Arthur E. Hutt, Seymour Bosworth, Douglas B. Hoyt (1995) ISBN: 0471118540 Firewalls and Internet Security: Repelling the Wily Hacker William R. Cheswick, Steven M. Bellovin (1994) ISBN: 0201633574 Fundamentals of Computer Security Technology Edward G. Amoroso (1994) ISBN: 0131089293 Hacker Proof: The Ultimate Guide to Network Security Lars Klander, Edward J. Renehan (1997) ISBN: 188413355X Halting the Hacker: A Practical Guide to Computer Security Donald L. Pipkin (1997) ISBN: 013243718X Information Warfare : Chaos on the Electronic Superhighway Winn Schwartau (1996) ISBN: 1560251328 Internet Firewalls and Network Security Chris Hare, Karanjit S. Siyan (1996) ISBN: 1562056328 Internet Firewalls and Network Security Karanjit, Ph.D. Siyan, Chris Hare (1996) ISBN: 1562054376 Internet Security: Professional Reference Derek Atkins, Tom Sheldon, Tim Petru, Joel Snyder (1997) ISBN: 156205760X Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network Anonymous (1997) ISBN: 1575212684 Personal Computer Security Edward Tiley (1996) ISBN: 1568848145 Practical Unix and Internet Security Simson Garfinkel, Gene Spafford (1996) ISBN: 1565921488 Protecting Your Web Site With Firewalls Marcus Goncalves, Vinicius A. Goncalves (1997) ISBN: 0136282075 Protection and Security on the Information Superhighway Frederick B. Cohen (1995) ISBN: 0471113891 Secrets of a Super Hacker Knightmare, the Knightmare (1994) ISBN: 1559501065 Security in Comput. Its not a cookie ger (1996) ISBN: 0133374866 Web Commerce Cookbook Gordon McComb (1997) ISBN: 0471196630 Web Security Sourcebook Avi Rubin, Daniel Geer, Marcus J. Ranum, Aviel D. Rubin, Dan Geer (1997) ISBN: 047118148X Web Security & Commerce (Nutshell Handbook) Simson Garfinkel, Gene Spafford (1997) ISBN: 1565922697 http://www.amazon.com/exec/obidos/ISBN=1565922697/t/0560-5831826-082656 Access Control and Personal Identification Systems Dan M. Bowers (1988) ISBN: 0409900834 Internet Security Secrets John R. Vacca. (1996) ISBN: 1-56884-457-3. Network and Internetwork Security: Principles and Practice. William Stallings. (1995) ISBN: 0-02-415483-0 Network Security: How to Plan for It and Achieve It. Richard H. Baker. (1994) ISBN: 0-07-005141-0 UNIX Security for the Organization. R. Bringle Bryant. (1994) ISBN: 0-672-30571-2. UNIX Security: A Practical Tutorial. N. Derek Arnold. ISBN: 0-07-002560-6 (1993) UNIX System Security: How to Protect Your Data and Prevent Intruders. Rick Farrow. (1991) ISBN: 0-201-57030-0 UNIX System Security Essentials. Christoph Braun and Siemens Nixdorf. (1995) ISBN: 0-201-42775-3 UNIX System Security. David A. Curry. (1992) ISBN: 0-201-56327-4 UNIX Unleashed. 1994 Susan Peppard, Pete Holsberg, James Armstrong Jr., Salim Douba, S.Lee Henry, Ron Rose, Richard Rummel, Scott Parker, Ann Marshall, Ron Dippold, Chris Negus, John Valley, Jeff Smith, Dave Taylor, Sydney Weinstein and David Till ISBN: 0-672-30402-3. Lastly, you will need to get some good tools to experiment with. They are here: http://ciac.llnl.gov/ciac/SecurityTools.html Basically, that should get you started. It is not necessary that you learn everything all at once. Obviously, the firm offering you the position does not expect the impossible. However, UNIX security is an on- going and complex field. You aren't going to ace it in a day. The idea is to get yourself up to speed with older problems, so that when newer ones crop up, you will understand their basis and origin. The reason for creating a network in your garage is that it offers you a chance to screw things up without any repercussions. Also, it simulates a micro-network, and allows you to view logs and responses from both the attack and victim sides. This is invaluable, as it will prepare you to instantly recognize trouble, just from examining the logs. Chief areas that you should cover are these: 1. NFS 2. The R Services 3. Passwords - proactive password checkers, DES in general, Crack, etc. 4. Spoofing 5. Routing techniques 6. Firewalls 7. CGI (if web servers are an integral part of the architecture of that network). It is recommended that you get the TIS Firewall Tooklit when you are ready. (Though, I suspect that the firm hiring you is more interested in local security that remote problems. Nevertheless, it is worth doing). /*Cracks, wares, and serial #'s The following list is for all you wares wanting, crack wanting, serial number wanting people that can't seem to find the information that you seek: http://www.geocities.com/SunsetStrip/Palms/5678/serial.txt (Serial #'s) http://www.compucall.com/keys.htm (Key generators and software patches) http://hack.box.sk/ (Serial numbers, cracks and utilities) http://www.iaehv.nl/users/zwets/sn/ (Serial numbers) http://cracking.byus.com/cscripts/cracks.asp (Kracka Vista) http://cracking.byus.com/fravia/ (Fravia's Page of Reverse Engineering) http://astalavista.box.sk (AstaLaVista software patch search engine) http://www.t50.com (Top 50 wares sites) http://www.nettaxi.com/citizens/caligo/cracking.htm (Utilities for making your /own/ software patches) If the links above do not offer what you are looking for, then here is a list of the appropriate newsgroups that cracks, wares, and serial number requests should be made in (In other words, not here!): (NOTE: When making a request, be polite or you won't get anything but a flame and/or possibly just ignored if you are lucky. When requesting something, make sure the subject line looks like so - "REQ: patch for certain software - URL included." Then in the message, /ask/ if anyone has a patch, serial number or a keygen for the particular software that you are looking for. And include the URL so they know what you are on about. You'll be surprised what a little common respect and politeness gets you. And above all - search for the crack, keygen, serial number /before/ requesting it in the group yourself, because chances are one of the sites above already have it.) news://alt.2600.crackz news://alt.cracks news://alt.binaries.cracks news://alt.binaries.cracks.phrozen-crew news://alt.2600.warez news://alt.2600.programz news://alt.warez.ibm-pc news://alt.warez.ibm-pc news://alt.binaries.warez.linux news://alt.binaries.warez.mac news://alt.binaries.warez.macintosh /*Viruses This link is for all of you virus wanting kiddies: http://www.chibacity.com/chiba/vrc/html /*Finding people on the net http://www.anywho.com (General people information) http://www.infospace.com (General people information) http://www.whowhere.com (General people information) http://www.four11.com (General people information) http://www.switchboard.com (General people information) http://www.cis.ohio-state.edu/hypertext/faq/usenet/finding- addresses/faq.html (FAQ for finding people) http://www.thecodex.com/search.htm (Stalking the net) http://www.internic.net/wp/whois/html (Find who owns a particular domain) http://rs.internic.net/cgi-bin/whois/ (Find who owns a particular domain) /*Phreaking related http://www-personal.engin.umich.edu/~jgotts/underground/boxes.html (Boxes) http://www.netcore.ca/~locutus/boxes/boxes.htm (Boxes) http://www.netcore.ca/~locutus/phreak/phreak.htm (Misc. info.) http://members.tripod.com/~iang/ (UK related phreaking info.) http://www.phonelosers.org/ (General phreaking info.) http://www.thtj.com (The Havoc Technical Journal) Have fun.... -- /* * Digital FingerPrint * * * XyVaBs3xYq9bDFd.3xQsabDT@usKabDPx5nv8kZXZy49 * wabDfd.3xsKd.3xPx5nv8kZVabDQs7eMFPx5nv8kZQsabD * T@usKabDSLmZpPx5nv8kZLz23QsLo0yxZy49wabDT@u * 9bDFLz23sKPx5nv8kzxZy49wabD9bDfd.3xsKd.3xPx5nv8k * ZVabDQs7eMFPx5nv8kZLz23Qs[Ic}/_abDxZy49wM_sKSL * mZpPx5nv8kZLo0ysKxZy49wOjk06?fqhsKd.3xPx5nv8kZxZ * y49wabD9bDfd.3xsKd.3xPx5nv8kZVabDQs7eMFPx5nv8kZ * d,3x?fXz6abDsKfqhM_?fXz6*Yt10zYZ2XyVaBs * * */ /* End. */