The UNIX operating system has gone through many different and interesting incarnations since it was invented in the early
70's, but one thing is clear: It's a real fun system for a hacker to play with. Once you get past the initial halting steps
of learning what you can do with it, UNIX provides many avenues of exploration, and many opportunities to get it to do things
that the owners of the machine didn't expect you (as a user) to be able to do.
What's interesting about technical files like those below is that the authors will often give you a basic set of skills
with UNIX before immediately delving into the arcana and weirdness necessary to do the trickery they're attempting. It must
have made for a mighty odd way to learn about an operating system for a young person on a BBS. Maybe it was even the better
way.
rm -rf .
Filename
|
Size
|
Description of the Textfile
|
admin2.txt
51966
| Improving the Security of Your Site by Breaking Into It, by Dan Farmer and Wietse Venema
|
begin.txt
85336
| UNIX For Beginners Second Edition, by Brian W. Kernighan
|
berkly42.txt
14848
| Understanding the UNIX Operating System (Berkeley 4.2) Patched Together by The War
|
bestunix.hac
7476
| My Favourite UNIX Commands, By ZeeBee Australia Inc. 1990
|
betunix.txt
9517
| Gaining Better Access On Any Unix System, by Doctor Dissector
|
bhacking.txt
5898
| A Beginner's Guide to Hacking UNIX by Jester Sluggo (October 8, 1985)
|
bible.txt
16109
| A Unix "Bible" (Actually a Glossary
|
breinhar.txt
37427
| White Paper on UNIX Security Issues, by Robert B. Reinhardt, November 11, 1992
|
curry.txt
140288
| Improving the Security of your UNIX System, by David A. Curry (April, 1990)
|
dirfind.txt
4242
| Newbie Tips: (Changing to / Hidden Directories) 1.1
|
hack.txt
10708
| Hacking Servers 101 by ChronicK of The E0D
|
hack1
8753
| UNIX Odds and Ends: Keeping Users Off the System
|
hack2
11957
| UNIX Trojan Horses
|
hack3.hac
7198
| The Basics of Hacking, by The Knights of Shadow (VAXs/UNIX)
|
hacking_unix.txt
41819
| An Indepth Guide to Hacking UNIX and the Concept of Basic Networking Utility by Red Knight of Phreakers/Hackers Undergound
Network (June 10, 1989)
|
hackunix
7408
| How to Hack UNIX and VAX Systems by Thief and Wizard (1989)
|
hackunix.txt
41972
| An Indepth Guide in Hacking UNIX and the concept of Basic Networking Utility by Red Knight of Phreakers/Hackers Underground
Network (June 10, 1989)
|
hide.hac
4486
| UNIX Abuse Collection, by ZeeBee Australia
|
hss.txt
6292
| Hacking Servers: A Beginner's Guide, by Lord Dredd
|
interunx.txt
355153
| UNIX For Intermediate users
|
linux_mo.asc
4634
| A Vulnerability in All known linux Distributions, by Bloodmask (August 13, 1996)
|
maccrac.txt
25503
| SOFTDOCS: Maccrac Version 0.1a by Ole Buzzard
|
metaunix.hac
5970
| A Beginner's Guide to Hacking Unix
|
muh.hac
6400
| A Beginner's Guide to Hacking UNIX By Jester Sluggo
|
nfstricks.txt
1944
| A List of NFS Tricks by Lord Pyro
|
nis.txt
1526
| NIS Explained by Virtual Circuit and Psychotic
|
p500unix.txt
34118
| A Flaw in the Berkeley 4.3 UNIX Passwd Program, with Code and History
|
phelon1.txt
9119
| PHELON #1: Some Information About Unix (For Beginners)
|
ports.txt
1559
| Some UNIX Ports and What to Do With Them
|
secdoc.hac
156965
| Improving the Security of your UNIX System, by David Curry
|
securesu.txt
29313
| How to Improve Security on a Newly Installed SunOS 4.1.3 System by Thomas M. Kroeger (July 1994)
|
security.txt
154698
| Improving the Securit of Your Unix System, by David A. Curry (April 1990)
|
sendmail.fun
2313
| A Little Sendmail Stuff, using the passwd file
|
sirsunix.hac
87805
| UNIX: A Hacking Tutorial, by Sir Hackalot
|
sobunix.txt
128483
| UNIX and Today's Hacker by Syncomm of (SOB 513)
|
socket.txt
3164
| The UNIX Socket Services
|
stupid.unx
10046
| Yet Even More Stupid Things to Do With Unix! by Shooting Snark
|
sysadmin.txt
14091
| Know your UNIX System Administrator
|
troj.hac
4790
| Basic Unix Use, by Lord Lawless
|
uhacknfo.hac
497325
| Security and the UNIX Operating System, 1990
|
uhcom.txt
23536
| A List of Some of the Most Useful UNIX Hacking Commands, and Some Hints on Their Usage
|
unix-nas.txt
5084
| UNIX Nasties by Shooting Shark (April 6, 1986)
|
unix-tro.txt
12412
| UNIX Trojan Horses by Shooting Shark of Tiburon Systems (June 26, 1986)
|
unix.001
141735
| UNIX Use and Security from the Ground Up by The Prophet (December 5, 1986)
|
unix.hal
22197
| A Guide to UNIX Systems Part I by Hackers Against Law Enforcements (September 1, 1989)
|
unix.inf
14710
| UNIX Primer and Command Reference by Frosty of Mechwarriors
|
unix.info
4174
| Things to Know about UNIX, by Sir Charles Hansen
|
unix.sec
120683
| Improving the Security of your UNIX System, by David A. Curry (April, 1990)
|
unix.txt
6016
| The Fundamentals of UNIX Passwords, by Mr. Slippery
|
unix.wek
5248
| Unix Conversions (From DOS to UNIX) by David Johnson
|
unix001.hac
141523
| UNIX Use and Security from the Ground Up, by The Prophet
|
unix001.txt
138851
| UNIX Use and Security from the Ground Up, by The Prophet (December 5, 1986)
|
unix1.hac
9992
| Hackers Against Law Enforcement Present A Guide to UNIX Systems
|
unix2.hac
11624
| COSMOS, by Doctor Who
|
unixacct.txt
10995
| Creating UNIX Accounts by the Kryptic Night and the Servants of the Mushroom Cloud
|
unixart.hac
9099
| Mitch Wagner of UNIX Today on an interesting Hacking Case
|
unixcall.txt
2048
| Using UNIX to do an Outdial
|
unixdos.fil
3986
| UNIX Conversions (The Filing System) by David Johnson
|
unixgrou.txt
141649
| Unix Use and Security from the Ground Up by The Prophet (December 5, 1986)
|
unixhak1.hac
5498
| Tutorial on hacking through a UNIX system
|
unixhak2.hac
12384
| On the Security of UNIX
|
unixhak3.hac
3971
| Things to Know about UNIX by Sir Charles Hansen
|
unixhck.hac
5260
| UNIX Hacking Made Easy by Shadow Lord
|
unixhell.txt
13528
| Raising Hell with UNIX by the Kryptic Night
|
unixhold.txt
141525
| Unix Use and Security From The Ground Up by The Prophet (December 5, 1986)
|
unixinfo.hac
3072
| Unix System Basics by the Terminal Technician
|
unixmyth.txt
14012
| Is UNIX Really That Bad? The Myths of UNIX
|
unixsec.txt
28235
| Imporving the Security of your UNIX System by David Curry (April 1990)
|
unixsir.hac
86374
| UNIX: A Hacking Tutorial by Sir Hackalot
|
unixsysv.hac
11408
| Hacking UNIX System V
|
unixsysv.txt
11197
| How to Hack UNIX SYstem V (January 18, 1989)
|
unixtips
23535
| A List Of Some OF The Most Useful UNIX Hacking Commands, and Some Hints On Their Usage
|
unixtroj.hac
11958
| UNIX Trojan Horses (A List)
|
unix~1.txt
34534
| An Indepth Guide in Hacking UNIX and The Concept of Basic Networking Utility by Evil Ernie of No Lamers Allowed
|
virpassw.txt
3780
| The Passwords Used by the Internet Worm
|
x86bsd_m.asc
4461
| L0pht Security Advisory (December 9, 1996)
|
xenix.txt
4909
| XENIX Commands and Information by Stingray
|
xwindows.txt
13072
| FAQ: A Crash Course in X Security
|
zenixinf.hac
4967
| XENIX COmmands and Information, by Stingray | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
The Above are hacker know how
General Security Tool Sites
Countermeasure Tools
Denial of Service
Enumeration Tools
Footprinting Tools
Gaining Access
Privilege Escalation and Back Door Tools
Pilfering
Rootkits and Cover Tracks
Scanning Tools
War Dialing Tools
|