Bad Ideas
Introduction to Hacking
Hack Attack
Hacker Zines
Hacking LANs, WANs, Networks, & Outdials
Magnetic Stripes and Other Data Formats
Software Cracking
Understanding the Internet
Legalities of Hacking
Word Lists
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Hacking LANs, WANs, Networks, & Outdials

NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.

"The network is the computer.: -- Scott McNealy, CEO, Sun Microsystems

Amateur Fortress Building in Linux by Sander Plomp
 I installed Linux on my home system, and since it's connected to the Internet I had to secure it. The average distro comes with nice set of security holes you've got to plug first. You know the routine: edit inetd.conf and comment out all services you don't need .... I got bored with articles telling you to edit inetd.conf too. So I'm not going to do it the official way - I'm going to do it my way.
Autopsy of a Successful Intrusion by Floydman
 I am about to describe here is the complete story of two successful network intrusion, where we (quickly and rather easily) had complete access to everything. And these are networks owned by (apparently) respected big corporations, and were equiped with firewalls and antivirus software. And they still wonder why e-commerce never lived up to expectations?
Cracking School Networks by protonigger
 Find out what kind of idiots really run your school.
Dr. AcoRed, or: How I Learned to Stop Worrying and Love BGP by Draco Red & Jason Argonaut
 We're writing this in response to an article that was put out a few months ago, about the general state of security in internet routing protocols. For those of you who have invented your own mnemonic device to remember the OSI seven-layer model, you're already saying to yourself "Oh, my god--they'll kill the internet." For those of you with a little less training you'll soon learn why you should have that response to the phrase "routing protocol security". The short of it is because there is none. At all. Whatsoever.
Eluding Network Intrusion Detection by Thomas H. Ptacek
 In passive protocol analysis, the intrusion detection system (IDS) unobtrusively watches all traffic on the network, and scrutinizes it for patterns of suspicious activity. We outline in this paper two basic problems with the reliability of passive protocol analysis.
Examining Port Scan Methods - Analysing Audible Techniques by dethy
 I will attempt to enumerate a variety of ways to discover and map internal/external networks using signature-based packet replies and known protocol responses when scanning. Specifically, this document presents all known techniques used to determine open/closed ports on a host and ways an attacker may identify the network services running on arbitrary servers.
IP-spoofing Demystified by Phrack Magazine
 The purpose of this paper is to explain IP-spoofing to the masses. It assumes little more than a working knowledge of Unix and TCP/IP.
Improving Your Site's Security by Breaking Into It by Dan Farmer
 Dan Farmer's original paper Improving Your Site's Security by Breaking Into It , introduces his security software SATAN.
Improving the Security of Your Site by Breaking Into it by Dan Farmer and Wietse Venema
 Every day, all over the world, computer networks and hosts are being broken into. The level of sophistication of these attacks varies widely; while it is generally believed that most break-ins succeed due to weak passwords, there are still a large number of intrusions that use more advanced techniques to break in. Less is known about the latter types of break-ins, because by their very nature they are much harder to detect.
Investigating an Attempted Intrusion by OptikNerve
 When activity occurs that you think could be intruders, there are 4 steps you can take to see if this is an attempted break-in or not.
MAC Addressing Demystified by protonigger
 Understanding the network by understanding its hardware.
Methodoloy of Firewall Penetration Testing by Reto Haeni
 First, we want to find out as much as possible about our target. To do so, we collect information first in a way that can not be detected by any logging or alarming system. For this step, we use publicly available information from sources outside the network.
Netbios for newbs by Nbtstatman
 Another fileshare tutorial.
The Networked Unix: TCP/IP by Solid State
 Guidance on features of the TCP-IP (Internet Transmission Control Protocol) architecture, such as FTP, TFTP, TELNET, SMTP, and the UNIX Remote Execution Facilities.
This page Copyright © 1997-2006 totse.com.

totse.com certificate signatures
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
a way to monitor someones AIM conversation
VERY simple question: browser history
anyone familiar with ms secure?
how do i hide files in to jpeg
FTP Attackers...
cable tv question
Sponsored Links
Ads presented by the
AdBrite Ad Network