picture of a cool looking devil

Security and Hackerscene

Here you can find a list with links to the best information sources on the Internet as well as texts regarding security and hacking. If you miss something or would like to add a link, ... just write your suggestions, improvements, ... to matic@bau2.uibk.ac.at
Links to Securitysoftware or Newsletters and Files.
Have you ever wanted to become ROOT ?

You are visitor #


IP-Spoofing Demystified

This paper will explain the attack in detail, including the relevant operation system and network information. Furthermore system administrators will find methods in order to prevent this kind of attack.

WEB Spoofing

Here you will find information about one of the latest attacks - called WEB Spoofing. Furthermore there are also methods described to protect yourself against this kind of attack.

Intrusion Detection Checklist

Get informed about suggested steps for determining if your system has been compromised. System administrators can use it for looking for several types of break-ins.

CGI Security Compilation

To my knowledge this is the most extensive collection of papers concerning CGI Security. You will also find examples in Perl and C to fix known security risks. Furthermore system administrators get information on how to write secure CGI scripts.

X Window System Security

An introduction on how to improve the security of your site by using MIT-MAGIC-COOKIE and XAUTH.

Crash Course in X Windows Security

A detailed description of existing security holes - how to exploit and what system administrators can do to fix them.

Getting A Handle On Internet Security

If you solely want to get an overview of the current situation regarding Internet Security than this is the text you should read. But also advanced users may find something valuable.

Cracking the MIT-MAGIC-COOKIE-1

You can get remote keystrokes, ... even if the remote system is using the MIT-MAGIC-COOKIE-1 authorization protocol.

Compromise FAQ

How to secure your UNIX machine after it has been compromised.

How to cover your tracks

This one is the most comprehensive guide I have seen so far - divided into two parts. Number one is teaching you the theory and background and number two is called practice. System administrators will see the methods and tricks used by hackers to make themselves invisible.

An Architectural Overview of UNIX Network Security

This paper defines several layers of firewall, provides you with information to some of the most widely known tools and methods available to protect UNIX networks today, plus a brief discussion of the threat and the risk.

Remote Host Probing

A little programm which enables your to probe ports 1-1024 on a given host.

Essential Security Information

Providing you with information on how to detect if your system has been compromised, how to assess the security of your site and many tips.

Protecting Yourself from Password File Attacks

Showing system administrators how to defend their systems from this type of attack.

Defeating Shadow Passwd Protections

How to get the /etc/passwd file even when the remote system is using a shadow passwd file system.

Tips for improving security

"Improving the security of your site by breaking into it" - A describtion of ways and methods which hackers exploit in order to break-in. Dan Farmer and Wietse Venema, authors of the famous program SATAN are also mentioning how these security holes can be fixed.

UNIX Backdoors

This article shows how to hold onto root once you have it. One of the best articles around!

The Ultimate Sendmail Hole List

The most extensive compilation of sendmail bugs from Bugtrag, 8lgm, ... covering several operating systems! All holes are demonstrated by either a shell script or a C program.

The Mitnick Story

The real story of one of the greatest hackers plus a short describtion of how Tsutomo Shimomura finally got him.

Uebercracker and UeberAdmin

If you have ever wanted to become a real hacker or sysadmin then this is the right article for you.

How to become a UNIX hacker

I put this text herein because I get so many e-mails asking me what to do in order to become a unix hacker. So read this first!

Internet Daemons

You will find information about the methods (in this case daemons) used by hackers to compromise a computer-system.

Computer Hackers: Rebels with a Cause

A very interesting book which shows some of the hacker ethics, some kinds of hackers and their intentions.

UNIX System Security Issues

This article is showing how to improve the security of your site in order to prevent hackers from breaking-in.

UNIX for the Moderate

Information about tricks, which make hackers nearly invisible for sysadmins, how to use trojan horses, ...

Stalking the wily hacker

A must for everyone who is a computer-freak. Clifford Stoll is describing the ways how a hacker was traced and how to act when your system has been compromised.

Hiding out under UNIX

Did you know which methods, programs, ... hackers have developped in order to hide their presence?

Snarfing Remote Files

Get information about the possibilities to get remote files, ... A bit old but still interesting to read.

Sendmail Bugs

This program has driven several sysadmins to despair. A description of some sendmail-bugs.



the following pictures are buttons 2600 - The Hacker Quarterly

This is a magazin organized by Emanuelle Goldstein. Very famous and with phantastic information.

Security Bugware

One of the best collections of bugs to several operating systems. A MUST for everyone!

Matt's UNIX Security Page

Phantastic papers, programs, scripts, ... Don't miss this link!

Infowar

Superb information along with a good layout

The Security Garage

Great file resource. Many categories make the use of this site very easy.

The Computer Underground Digest

Probably the most famous magazine about themes like hacking, cracking or security. It also covers the social aspects.

Legion of Doom Technical Journal

Rather unknown but includes some hot stuff.

Phrack

This magazine has driven several systemadministrators to despair.

The Uebercracker Web Page

The Uebercracker belongs to the best sites in the underground. In my view this is the best place to start a journey through the world of hacking and computersecurity

The LOpht Homepage

This page ranks with the best meeting places of hacker. Especially the archives contain some treasures you can take advantage of.

Lukas Homepage

Information about hacking und game programming.

FoeBuD

In my view one of the best information sources available in german.

Hacker-Tic

A netherland-based journal, which has been publishing articles since the beginning of hacking, ...

A guide for UNIX-Hacker

Describes which wholes hacker exploit in order to penetrate the security facilities. Not available at the moment !

Basics of computersecurity

A must for those one, who are afraid of those, who have already visited this page and ...

The Internet Worm

Information about the unique program written by Robert Morris Jr. which paralyzed thousends of computers on the 2. November 1988. An analysis of the source-code plus description of the wholes (sendmail, finger).

The COAST Archive

One of the biggest archives concerning computersecurity. UNIX-, DOS- and Windowsprograms!

Cryptography and Cypherpunks

A gigantic FTP-Site with information about hacking and security. There is enough stuff to read up to the evening of life.

Firewall FAQ

What you have ever wanted to know about firewalls - here you get it.

The NHI UNIX Security Page

The National Institute of Health's Advanced Laboratory Workstation Systems is providing security programs and patches.

The Netsurfer Digest

There you can find an extensive index about Web-Sites, mailing lists, newsgroups and gopher-resources in connection with themes dealing with security.

Newsgroups

Take a look at one of the numerous newsgroups which include information about security.

A guide for network security

The company Pilot Security is providing information about computersecurity.

PGP Inc's HQ:

Take a look at this site if you would like to inform yourself about PGP related subjects.

Secure transactions on the Internet

Due to the fact that more and more hacker are trying to tap newswires, ... you should make sure that nothing is getting wrong when going shopping in the net. Information can be obtained at "First Virtual".

The sozial structures of the computerunderground

A study of Grodon Meyer who is studying criminalogy at the university of Nothern Illinois.

Terisa Systems' Open Security Platform

Get information about the development of the company Terisa Systems, which aim to build up a secure transaction system.


Further links without remarks

Phunky Elite Shit

That Guy's Home Page

Computer Marines

Collegetown

The Black Crawling System

Paranoia Home Page

Rob's Home Page

SPY

Doctor Who $LOD$

HotWired

Jeff Warnicas Internet Goodies

Mindvox

Iron Feather Journal

The Internet Underground

The International PGP Home Page

PGP - Pretty Good Privacy

Unauthorized Access

Computer and Network Security

The Jargon File (Hacker's Dictionary)

The Dark Side of Computing

Al's Home Away From Home

The World of Hacking

Weed's Home Page

The Avenger's Front Page

Scott's Anarchy Page

Pollanen's Beware Page's

Viral Nirvana

Welcome to All.Net

Dan Kegel's ISDN Page

AT&T Internet Toll Free 800 Directory

UNIX Security Topics

Dcypher's Home Page

COAST Homepage ( 3-Aug-1995)

NIST Computer Security Resource Clearinghouse

James (LoNGi) Longworth's Homepage

This is the end of all things

The World-Wide Web Virtual Library: Cryptography, PGP, and Your Privacy

Computer Security Research Laboratory at UC Davis

Presentation Slides of the Security Lab at UCD

Center for Security Studies and Conflict Research

Keytrap Home Page

Matt Thomlinson / phantom@u.washington.edu / Cypherpunks Topics

potpourri.html

Rainbow Series Page

The Hacker Crackdown

ICE Network Information System

Betsi's Home Page

SPAWAR INFOSEC Homepage

L0pht Heavy Industries

International Information Retrival Guild Archives

SAIC System Development Operation Center

Motorola Semiconductor Production

Federal Bureau of Investigation - Home Page

NASA Automated Systems Incident Response Capability (June 23, 1995)

Lance Cottrell Home Page

From the virtual desk of Glen L. Roberts

The Cypherpunks Home Page

The Tech

Celestial Press

New Jeff City

Safetynet, Inc.

Underground

8LGM

Ameritech-Your Link to Better Communication

Unix Security

Security, Virus's, System Management and hacking

Electronic Frontiers Australia home page

Bell Atlantic Media Relations

X Windows Security

Alliance for Competitive Communications

Bellcore Security Products

Nick's Index

The BellSouth Telecommunications Homepage

Safe! at home (mcn@lanl.gov's home page)

OCP's Telecommunication & Computer Guide

The DFN-CERT Home Page

alt.2600 FAQ, Beta .012 - Part 1/1

The Secure HyperText Transfer Protocol

TCP/IP Port Numbers

PaketRat's Home Page

CPSR's Foyer

Tuft's Cypherpunk's Alerts!

THE HACKER CRACKDOWN

Home Page for John

Bsy's Security Related Net-pointers

Secure products information Page

SRI Computer Science Laboratory

Directory of public telephones

Data Fellows World Wide Web Server

DigiCash ecash - ecash home page

Secure Systems, Subject Index

Gui 'N Da Hood

Bugtraq Archives for July 1995 - present by thread

Intrusion Detection Systems (IDS) Archives by thread

Publications and Papers of the Electronic Frontier Foundation

Racal's Home Page

John's Boxing Page

The alt.2600/#hack FAQ Introduction

System administration

Electronic Magazines

DefCon ][ Information (History)

FedWorld Beta Home Page

Forum of Incident Response and Security Teams

KarlNet

CRAK Software

Great Circle Associates Home Page

National Security Agency (NSA)

Central Intelligence Agency Home Page

CRAK Software

Distributed Computing Security

Guide to Lock Picking

Linenoiz Homepage

The Underground

Radio Waves

HACKERS

War on the Internet

NIST WWW - Home Page

NTT Home Page

Internet Locations for Materials on the Disks for Applied Cryptography

Pacific Bell Web HomePage

Fringe Literature

PGP 2.6.2 hypertext documentation

Onkel Dittmeyer's K-RaD 31i73 homepage!!@#

Hacker Links

Quadralay Cryptography Archive

CDMA - Wireless Communications

An AT&T Bell Laboratories Research World-Wide Web Server

RSA Data Security, Inc.'s Home Page

popeye the sailor man TOOT TOOT

Rourke McNamara's Home Page

US West Page 1

The World of Hacking

CSC's SPYBBS ``Too Many Secrets''

Welcome to SRI International

Computer and Network Security Reference Index

Trusted Information Systems

Network/Computer Security Technology

SYNAPSE: The Multimedia Journal of the Eclectic

Warning !!!

Security-related files

Frequently Asked Questions on VIRUS-L/comp.virus

THE HACKER CRACKDOWN - Table of Contents

The Devil Does UNIX

LDDS WorldCom Home Page


40 Hex Magazine

Anarchy 'N' Explosives

The Art of Technology Digest

Activist Times Inc.

The BIOC Files

The Cult of the Dead Cow

Chalisti

Digital Free Press

Freakers Bureau Incorporated

Freedom

Informatik

Chaos Digest

The Legion of Doom Technical Journals

Legions of Lucifer

Miscellaneous Underground Files

N.A.R.C Newsletter

The New Fone Express

Network Information Access

National Security Anarchists

Phantasy Magzine

PHUN Magazine

Pirate Magazine

The Syndicate Report

United Phreakers Incorporated Newsletter

Vindicator Publications

The WorldView

Markus Hübner

February 1997

Home-Page picture