.:: B. Windows Security ::. 1. Buffer Overflow Vulnerability in IIS 5.0 2. Superfluous Decoding Vulnerability in IIS 3. Buffer Overflow in IIS Indexing Service DLL 4. IIS 5 Remote .printer overflow 5. IIS CGI Filename Decode Error exploit 6. Win2000 IIS exploit 7. AusCERT Alert 2001.02 IIS E-Commerce Vulnerabilities 8. AusCERT Alert 2001.07 Microsoft IIS 5.0 Remote Administrator Compromise Vulnerability 9. IIS Directory Traversal bugs 10. IIS Remote Buffer Overflow 11. IIS IDQ Exploit 12. IIS - MS update on several patched vulnerabilities 13. CIAC L-078 - Microsoft IIS unchecked buffer in isapi extension 14. CIAC L-083 - Microsoft CGI Filename Decode Error Vulnerability in IIS 15. IIS view dir structure, view/delete files, exec arbitrary code, DoS 16. IIS CGI processing weakness 17. IIS flaw leads to deliberate memory leak 18. CIAC L-139 Microsoft IIS %25u encoding IDS bypass vulnerability 19. IIS buffer overflow 20. IIS ISAPI index server extension query processing flaw 21. IIS ASP show-source vulnerability 22. IIS ASP processor will crash if device-files are attempted to be opened 23. Windows 2000 IIS 5.0 buffer overflow 24. IIS 5.0 remote restart 25. CIAC L-132 Microsoft Cumulative Patch for.IIS 26. AusCERT Alert 2001.08 Current widespread intruder activity against IIS and sunrpc 27. Microsoft IIS Hotfix Summary 28. CIAC L-100 - FrontPage Sub-Component Vulnerability 29. FrontPage Server Extensions DoS 30. Microsoft Internet Explorer calls telnet.exe with unsafe command- line arguments 31. Microsoft Internet Explorer-Content Type Falsification 32. MSIE: Automatic Execution of Embedded MIME Types 33. IE Bookmark spoof concept 34. IE6 invalid URL crash 35. CIAC L-066 - Internet Explorer MIME Header Vulnerability 36. CIAC L-087 - Microsoft Internet Explorer Flaws in Certificate Validation 37. MSIE crash via malformed link 38. MSIE 4.x crash with very simple link 39. MSIE disable certificate validation, fake URL in browser bar 40. MSIE read textfiles from client's hard disk 41. MSIE - breaking the authentication mechanism 42. MSIE / Outlook XP may allow arbitrary commands to be executed from a malicious website 43. Multiple Remote Windows XP/ME/98 Universal Plug and Play Vulnerabilities 44. Window File Wiping Utilities Miss Alternate Data Streams 45. Microsoft Windows NT/2000 Trust Domain Vulnerability 46. Microsoft Telnet Server Buffer Overflow Vulnerability 47. MS Exchange - Incorrectly Sets Remote Registry Permissions 48. Microsoft Internet Explorer Cumulative Patch 49. CIAC L-126 Microsoft Remote Procedure Call RPC Server Vulnerability 50. CIAC L-142 RPC Endpoint Mapper Vulnerability 51. CIAC M-004 Excel and PowerPoint Macro Vulnerability txt 52. CIAC M-005 office xp error reporting sends sensitive docs txt 53. Office XP / MSIE - Malicious ActiveX controls lead to arbitrary code execution 54. CIAC L-089 - Microsoft Unchecked Buffer in Media Player ASX Processor 55. WinZIP Computing's WinZIP 8.0, PKWare PkZip 4.0, RARSoft WinRar 2.80 - directory traversal issues 56. Windows Media Player - crashing the system 57. Word for Win32/Mac - macros in templates linked to by RTF documents can be caused to run on opening 58. MS Word crash 59. MS Word macro security issues 60. Interbase Server Contains Compiled-In Backdoor Account 61. CIAC L-073 - MS ISA web proxy DoS 62. CIAC L-074 - MS webdav runs scripts as user 63. CIAC L-079 - Microsoft Domain Controller Core Service Memory Leak 64. CIAC L-081 - Microsoft Index Server Search Function Buffer Overflow 65. CIAC L-091 - Microsoft Exchange Server Outlook Web Access Flaw 66. CIAC L-092 - Microsoft Predictable Name Pipes In Telnet 67. CIAC L-095 - Microsoft SQL Query Method Vulnerability 68. CIAC L-098 - Microsoft Index Server ISAPI Extension Buffer Overflow 69. CIAC L-101 - Microsoft LDAP Over SSL Password Vulnerability 70. CIAC L-107 - (Win2000) Microsoft Authentication Error in SMTP Service 71. Trend Micro Virus Buster Ver.3.5x read arbitrary files 72. Spynet Chat 6.5 DoS 73. Eudora 5.1 execute arbitrary code 74. Hotmail exploit for Linux 75. InterAccess DoS 76. Icecast Remote DoS, Folder Traversal Exploit 77. Incredimail remote file overwrite 78. Win2k LDAP Domain Admin compromise 79. NetProwler disable IDS 80. NetProwler weak passwords 81. Netscape Enterprise Server on NT - DoS 82. Outlook Express spoofarino 83. Crash Win95/95/ME running Mcafee Remote Desktop 3.0 84. Windows 2000 SMTP service authentication flaw 85. Windows 2000 telnet service seven vulnerabilities 86. VdnsServer 1.0 DoS 87. Becky! 2.00.05 Buffer Overflow 88. IBM Windows DB2 services can be crashed remotely 89. DynFX POPd Buffer Overflow 90. Electrocomm 2 and prior DoS 91. HyperTerminal Buffer Overflow 92. Microsoft Exchange malware scripts allowed 93. ARP Table handling bug in Windows protocol stacks 94. CIAC L-113 Microsoft Outlook View Control Exposes Unsafe Functionality txt 95. AusCERT Alert 2001.04 Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard 96. Offline Explorer Advisory 97. AVTronics InetServer Buffer Overflow 98. NNTP Win2k/NT Memory Leak 99. PcAnywhere 9.2 DoS 100. ISA Server - three security vulnerabilities 101. Java Plugin 1.4 with JRE 1.3 doesn't handle certificates properly 102. Microsoft DCE/RPC inadequately validated user inputs 103. OpenView and NetView execute arbitrary commands 104. Win 2000 IrDA remote BSoD 105. WinAMP ShoutCast server crash 106. Windows 2000 telnet service DoS 107. Windows RDP memory leak 108. ZoneAlarm harmful files quarantining failure 109. Trend Micro Applet Trap 2.0 - attackers can bypass restrictions 110. Identix Biologon only locks screen zero 111. CIAC L-109 - VPN-1 Firewall-1 RDP Comm Vulnerability 112. Windows 2000 Kerberos DoS 113. TrendMicro InterScan WebManager Version 1.2 RegGo.dll Buffer Overflow 114. TrendMicro InterScan WebManager Version 1.2 Buffer Overflow 115. SurfControl - bypass with proxy 116. VirusWall for NT 3.51 - buffer overflow 117. VirusWall for NT - smtpscan.dll remote execute arbitrary command 118. VirusWall for NT - HttpSaveC?P.dll remote execute arbitrary command 119. VirusWall for NT - RegGo.dll buffer overflow 120. VirusWall for NT - remote user can change config 121. VirusWall for NT - remote user can gain admin functions access 122. WatchGuard lets blocked-by-extension attachments through anyway 123. AppletTrap restrictions can be bypassed 124. Win2k EFS plaintext copies of supposedly-encrypted files 125. eSafe Gateway - bypass filtering mechanism 126. Check Point VPN-1(TM) & FireWall-1(R) Version 4.1 - bypass with faked RDP packets 127. VPN-1/FireWall-1 string format errors 128. SpyAnywhere plaintext password 129. Checkpoint Firewall-1 Security Issues 130. MAILsweeper - bypass malicious file blocking 131. PAV prior to 6.23.00 handles malformed UPX-packed files badly 132. PWS long filename vulnerability 133. Check Point RDP Bypass Vulnerability 134. Netscape Messenger may reveal locations of files for other exploits 135. Netscape exploit 136. Mozilla prior to 0.9.2 password compromise 137. iPlanet/Netscape Enterprise Web Publisher Buffer Overflow 138. Win2K kernel privilege elevation 139. Win 2000 Hotkey mapping vulnerabilities 140. Exploiting Windows NT 4.0 Buffer Overflows 141. Windows NT Deconstruction Techniques 142. Looking inside your Windows 98 - Finding an hidden incredible database inside your computer 143. Phun with Windoze 144. Windows 95/98/NT Backdoor 145. Some Windows NT Junk 146. Fun with Windoze Networking 147. Bugs that I am embarassed to admit I found 148. Win NT, 2000 kernel reboot 149. Win2000 unauthorized database access 150. WinNT 4.0 kernel local DoS 151. Window Maker Buffer Overflow 152. Windows 2000 SP2 and earlier kernel admin lockout 153. Windows Media Player 6.4, 7, and 7.1 unchecked buffer 154. dumpevt.pl 155. CompaqInsightManager Check & DoS 0.5 156. dumpevt2.pl for NT 157. NT Test For Guest Scanner 158. Rebuttal against Steve Gibson's war on Windows XP Raw Sockets 159. Proper Use of Open Source Software at Microsoft
.:: C. Crypto, Virology, Cracking And Backdoors ::. 1. Phil Zimmermann: "No regrets" about developing PGP 2. This is the signature for the GnuPG 1.06 Tarball 3. Cracking the EAN Barcode System 4. Replacing PGP 2.x with GPG 5. GnuPG format string weakness 6. Cryptanalysis of Microsoft's PPTP Authentication Extensions 7. Tools Information :: Crypto :: Cryptanalysis 8. Detecting Steganographic Content on the Internet 9. Tools Information :: Crypto :: Steganography 10. Gnu Privacy Handbook - Part 1 11. Gnu Privacy Handbook - Part 2 12. High-bandwidth Digital Content Protection system cracked 13. Unauthentic "Microsoft Corporation" certificates 14. A Primer on Mobile Application Security 15. Sapphire Stream Cipher 16. The Sapphire II Stream Cipher 17. American Vietnam P.O.W. Code 18. The CueCat UPC-A Cipher 19. Network Solutions Crypt-PW Weak Encryption 20. Messenger/Hotmail bug inpassword encryption 21. OpenSSL up to 0.9.6a pseudorandom number generator design error 22. PassWD2000 v2.x weak encryption 23. ArGoSoft FTP Server 1.2.2.2 password decryption 24. CesarFTP v0.98b Directory Traversal, Weak Password Encryption 25. Cryptography and Data Security Tutorial Part 1 26. Cryptography and Data Security Tutorial Part 2 27. Cryptography and Data Security Tutorial Part 3 28. Cryptography and Data Security Tutorial Part 4 29. Cryptography and Data Security Tutorial Part 5 30. Cryptography and Data Security Tutorial Part 6 31. Cryptography and Data Security Tutorial Part 7 32. Cryptography and Data Security Tutorial Part 8 33. Microsoft's Digital Rights management Scheme 34. Tools Information :: File Encryptors 35. W32/Myparty Malicious Code 36. SirCam virus passes right through VirusWall 3.51 Build 1321 for NT 37. Adobe Acrobat PDF Files can be used to deploy viruses! 38. Is McAfee going to deliberately not detect the "Magic Lantern" virus??? 39. McAfee's response to the allegation that they will turn a blind eye to "Magic Lantern" 40. The FBI wants to use the BadTrans worm's stolen data 41. A little source code to parse the BadTrans worm's pilfered data 42. AusCERT Alert 2000.05 Love Letter Worm Virus 43. AusCERT Alert 2000.06 Newlove Virus 44. AusCERT Alert 2000.07 Resume Macro Worm 45. AusCERT Alert 2000.08 Stages VBS Worm 46. AusCERT Alert 2000.11 Hybris Worm 47. AusCERT Alert 2001.01 AnnaKournikova.jpg.vbs (Onthefly) Worm 48. AusCERT Alert 2001.03 W32/Magistr Virus/Worm 49. AusCERT Alert 2001.05 New Bind worm: 1i0n 50. AusCERT Alert 2001.09 Homepage.HTML.vbs (Homepage) Virus 51. AusCERT Alert 2001.10 New Word Macro Virus 52. AusCERT Alert 2001.11 W32/Leave.B Worm 53. AusCERT Alert 2001.12 W32.Sircam.Worm@mm Virus 54. AusCERT Alert 2001.13 Potential Increase in "Code Red" Worm Activity 55. AusCERT Alert 2001.14 New Worm - "CodeRedII" 56. AusCERT Alert 2001.15 W32/Nimda.A@mm worm 57. VBS/OnTheFly (Anna Kournikova) Malicious Code 58. Sadmind/IIS Worm 59. Code Red Worm Exploiting Buffer Overflow in IIS Indexing Service DLL 60. SirCam FAQ 61. W32/Sircam Malicious Code 62. Continued Threat of the "Code Red" Worm 63. Nimda Worm VIR 64. CIAC L-117 Code Red Worm 65. CIAC L-120 Cisco Code Red Worm Impact 66. CIAC L-144 the W32 nimda Worm txt.010921171330 67. The Code Red Worm 68. The Code Red II worm 69. CIAC L-064 - The Lion Internet Worm DDoS Risk 70. Tools Information :: Virus/Worm Protection Utilities 71. Tools Information :: Back Orifice and BO2K 72. Tools Information :: SubSeven and Addons 73. Tools Information :: Remote Administration Tools 74. Tools Information :: Trojan Detectors/Removers/Retaliators 75. The possibility of hiding trojans in Shell Scraps - files with extensions that Windowz tries very hard to hide HAK 76. Backdoors 77. CIAC L-077 - Glacier Backdoor 78. Creating Trojan PGPDisks 79. Fun with "Trojan" Wingates
.:: D. What You Can Do To Keep Your System Safe ::. 1. Official Alt.Hackers.Malicious Faq - Part 1 2. Official Alt.Hackers.Malicious Faq - Part 2 3. Official Alt.Hackers.Malicious Faq - Part 3 4. Information Overload for Newbies 5. Dealing with External Computer Security Incidents 6. AusCERT Alert 2000.03 Current Widespread Intruder Activity 7. Continuing threats to home users 8. Statistical Weaknesses in TCP/IP Initial Sequence Numbers 9. Coordinated Attacks and Probes 10. Stealth Coordinated Attacks 11. Format Bugs 12. What you need to: Spoof/Hijack/Predict 13. Paranoia vs. Transparency and their effects on Internet Security 14. Compromised Buffer Overflows, from Intel to Sparc version 8 15. Advanced Buffer Overflow Exploit 16. Writing Buffer Overflow Exploits - A Tutorial for beginners 17. Digital Voodoo - The Craft of Hacking on the Internet - Part 1 18. Digital Voodoo - The Craft of Hacking on the Internet - Part 2 19. Digital Voodoo - The Craft of Hacking on the Internet - Part 3 20. Digital Voodoo - The Craft of Hacking on the Internet - Part 4 21. Digital Voodoo - The Craft of Hacking on the Internet - Part 5 22. w00w00 on Heap Overflows 23. CIAC Incident Handling Guidelines - Part 1 24. CIAC Incident Handling Guidelines - Part 2 25. CIAC Incident Handling Guidelines - Part 3 26. ESNet/Decnet Security Policy 27. Principles of Buffer Overflow explained 28. Protecting Memory and Addressing - Part 1 29. Memory and Addressing Protection - Part 2 30. How to Hack a School Network 31. Beginners Guide to VAX/VMS Hacking - Part 1 32. Beginners Guide to VAX/VMS Hacking - Part 2 33. Hacking Direct Access 5.0 34. Oracle 9iAS Multiple Buffer Overflows in the PL/SQL Module 35. Oracle's ADI 7.1.1.10.1 plaintext passwords 36. Oracle (all versions of Oracle on Windows NT) DoS 37. Oracle 8i 38. Oracle 8i TNS Listener Exploitable Buffer Overflow 39. Oracle 8, 9i dbsnmp Buffer Overflow 40. Oracle 8.1.5 dbsnmp root 41. Oracle 8i TNS Listener Buffer Overflow 42. CIAC M-011 Oracle Trace Collection Security Vulnerability 43. CIAC M-012 Oracle File Overwrite Security Vulnerability 44. Oracle oratclsh vulnerability 45. CIAC L-108 - Oracle 8i TNS Listener Vulnerability 46. Multiple LDAP vulnerabilities 47. Vulnerability in OpenView and NetView 48. Mathematica 4.0, 4.1 licence manager bugs 49. Introduction to Assembly Programming 50. WinZip, PKZip, WinRAR - all have problems with device filenames 51. Booby Trapped Shareware 52. Latitude C800 BIOS Suspend to Disk problems 53. Terminal Servers and Network Security 54. Hacking an Access Database 55. How to Hack Nedbank 56. How to get a root shell on NedBank 57. Hacking Standard Bank 58. Hacking the CyberXpress Internet Kiosk 59. Hacking in Switched Environments 60. More fun with CyberXpress Internet Kiosks 61. More fun with Nedbank's Nedassist Terminals 62. Better Password Practices 63. Hacking T-Online Passwords 64. Handler and Cracking Passwd Files 65. Tools Information :: Password Generators 66. Tools Information :: Password Security Audit Programs 67. sscan scanning tool 68. Defeating Portscan Detection 69. portchk.c 70. pscan 71. findomains.c 72. Propecia Port Scanner 73. Soup Port Scanner 74. PScan Port Scanner 75. Simple Ping Sweep 1.0b 76. Simple Stealth 1.10 77. Sl0scan 78. Statd Overflow Scanner 79. Web proxy port scanner Beta 1.1 80. Tools Information :: Network Scanning 81. Wardialing Brief 82. Local Area Detection of Incoming War Dial Activity 83. Tools Information :: Fingerprinting 84. Reconstructing Serialized Java Objects from Sniffer logs 85. krnsniff 0.1a 86. Tools Information :: Sniffing 87. Sage Software's MAS 200 - easy remote disable 88. Tomcat DoS 89. MiM simultaneous CLOSE attack 90. Raytheon SilentRunner 2.0, 2.0.1 DoS 91. Mirror DoS 92. DoS Attacks using the Domain Name System 93. June 18 DoS Threat 94. AusCERT Alert 2000.02 Recent Denial of Service attacks 95. NIPC Advisory 01-26 Increased Potential for Distributed Denial of Service (DDoS) Attacks 96. How DDoS attacks work (in German) 97. Babel, DDoS of Biblical Proportions 98. Trinoo Killer 99. Tools Information :: Denial of Service Attacks 100. Revealing Email Headers 101. MDaemon SMTP server 4.0.5 unauthorized relaying 102. COTSE Pseudo-Anonymous Usenet Version 2.02 103. Posting through closed news servers using open proxies 104. Cookie Leak Security Hole in HTML Email Messages 105. Email Pseudonym Server 106. Proxomitron Naoko-4 BetaFour arbitrary Javascript execution 107. Squid - abuse as portscanner 108. Multiple Vulnerabilities in BIND 109. ISC BIND Vulnerability 110. Patch for DNS DoS 111. Coding with the DNS Protocol 112. BIND Vulnerabilities and Solutions 113. DNS ID Hacking - Part 1 114. DNS ID Hacking - Part 2 115. Spam FAQ - Part 1 116. Spam FAQ - Part 2 117. Spam FAQ - Part 3 118. Tools Information :: SPAM 119. SurgeFTP weak hash to store admin password 120. TrollFTPD-1.26 exploitable buffer overflow 121. WS_FTP server 2.0.2 buffer overflow 122. Win98 kernel bug 123. wu-ftpd/BeroFTPD MAPPING_CHDIR Vulnerability 124. Multiple Vulnerabilities in Wu-FTPD based daemons 125. File Globbing Vulnerabilities in various FTP Servers 126. wu-ftpd "site exec" vulnerability 127. GlFTPD CPU Hog 128. IBM TFTP Server for Java directory traversal 129. NetWin Authentication Module 3.0b password hash issues 130. Proftpd DoS 131. Argosoft FTP Server Advisory 132. AusCERT Alert 2000.09 Current widespread intruder activity against ftpd 133. A-FTP Denial of Service 134. ArGoSoft 1.2.2.2 FTP Server Directory Traversal vulnerability 135. Broker FTP Server 5.9.5.0 Buffer Overflow/DoS, Directory Traversal 136. Bison FTP Server v4r1 directory traversal 137. Broker FTP Server 5.9.5.0 link upload vulnerability 138. Bison FTP Server v4r1 link upload vulnerability 139. Cerberus FTP Server 1.x Buffer Overflow 140. CesarFTP v0.98b Buffer Overflow 141. CesarFTP Stack Overflow 142. CrushFTP Server 2.1.4 Multiple Vulnerabilities 143. Win2000 ftp - any file on system can be deleted 144. Multiple FTP Daemons Buffer Overflow - Part 1 145. Multiple FTP Daemons Buffer Overflow - Part 2 146. Serv-U FTP Server, G6 FTP Server, WarFTPd Server,... DoS with Perl exploit 147. G6 FTP Server up to version 2.0 get path vulnerability 148. gftp prior to 2.0.8pre1 segfault 149. gftpd segfault 150. Ghetto FTP Server version 1.0 beta 1 directory traversal 151. GuildFTPD v0.97 Directory traversal 152. GuildFTPD v0.97 buffer overrun, memory leak 153. MIT Kerberos 5, all releases. FTP daemon buffer overflow 154. Rumpus FTP Server 1.3.5 lockout 155. Rumpus FTP lockup 156. Surge FTP Server directory traversal 157. SpoonFTP incorrect boundary checks 158. TYPsoft FTP server break out of FTP root 159. WFTPD 32-bit (X86) 3.00 R5 directory traversal 160. WFTPD *.lnk problems 161. WFTPD A: drive DoS 162. The FTP Tutorial 163. Free Dialup Internet 164. ICMP Stands for Trouble 165. Identifying ICMP Hackery Tools 166. Virtual LAN Technology Report 167. SSH protocol weaknesses 168. Hacking Dockside Temporary Internet Accounts 169. (Ab)using Offline HTTP/FTP services 170. Coding simple Sockets in Perl 171. Blackhole TCP/UDP behaviour and its effect on nmap 172. Routing Information Protocol spec 173. @Home network - taking over someone's IP address 174. DSL Security Whitepaper 175. Linksys DSL Router 176. Linksys EtherFast 4-Port Cable/DSL Router cleartext passwords 177. Multiple Vulnerabilities in Alcatel ADSL Modems 178. Multiple DoS Vulnerabilities in Cisco Broadband Operating System CBOS 179. ZyXEL Prestige 100, 202, 642R and 642R-I 2.50 ADSL Routers password default 180. Surfing the Web Backwards - Backlink Navigation 181. HTTP Basic Authentication explained 182. HTML Form Protocol - send arbitrary data to any port 183. Netaddress.com mailing service login form exploit 184. How to fake a Hotmail email 185. How we defaced www.apache.org 186. Hacking Tripod Accounts 187. Anonymizer, SafeWeb comments out Javascript instead of cutting it out completely 188. Yahoo/Hotmail susceptible to worms 189. gmx.net javascript filtering weakness 190. How to Hack a Geocities-type Web Page 191. Hotmail - view someone else's email! 192. Roxen arbitrary file retrieval 193. Sambar Web Server directory traversal 194. Sambar static Blowfish key 195. Sambar DoS 196. NetWare Enterprise Web Server - two issues 197. Mambo Site Server version 3.0.X admin privileges 198. Java Personal Webserver 0.9 Denial of Service 199. ACI 4D Webserver directory traversal 200. McAfee ASaP VirusScan lightweight web server - break out of its root 201. OmniHTTPd DoS, Show-source 202. Mac OS X 10.0.3 / Darwin 1.3.3, Apache 1.3.14 203. Apache 1.3.17 get directory exploit 204. OmniHTTPd Pro DoS 205. Jana Webserver v1.45, 1.46, 2.0Beta1 hex-encoded dot-dot directory traversal 206. Lotus Domino Server 5.0.6 force Javascript to run 207. Lotus Domino 4.x, 5.x routing loop 208. Savant WWW url-encoded characters filtering problem 209. vWebServer show-code vulnerability 210. Webtrends HTTP Server show-source 211. Personal Web sharing v1.5.5 input overflow 212. SITEWare cleartext passwords, read arbitrary files 213. SITEWare 2.5, 3.0 arbitrary viewing of world-readable files anywhere on system 214. Trend Micro Virus Control System(VCS) unauthorized admin access 215. WAP gateways 216. Acme.Server 1.7 root exploit 217. Air Messenger LAN Server HTTP Interface Directory Traversal Attack 218. McAfee Agent ASaP VirusScan Software HTTP server directory traversal 219. Freestyle Chat server Directory traversal vulnerability 220. LiteServe MS-DOS filename show source vulnerability 221. SnapStream PVS builtin web server - 3 vulnerabilities 222. Lotus Notes/Domino Security Vulnerabilities AusCERT Alert 2000.10 DefCon 8.0 223. Uncgi directory traversal 224. WinWrapper Professional 2.0 read arbitrary files 225. Respondus v1.1.2 weak encryption 226. SuSE 6.x, 7.x sdbsearch.cgi misplaced environment variable trust 227. Tivoli Management Framework problem 228. Tivoli SecureWay Policy Director incorrect URL-Encoding handling 229. HTTProtect 1.1 - change protected files 230. MyPhpAdmin remote command execution 231. NetCode NC Book 0.2b remote command execution 232. PHPLib prior to 7.2 prepend.php3 - non-local code injection 233. PHProjekt security hold 234. PHP 4.0.x mail() does not check for shell escape codes 235. PHPnuke 5.x improper variable checking 236. BSCW Symlinks vulnerability 237. Cold Fusion on Linux cfrethrow tag crash 238. Cold Fusion multiple remote vulnerabilities 239. Cold Fusion multiple remote vulnerabilities 240. ttawebtop.cgi read arbitrary files 241. udirectory.pl remote command execution 242. viewsrc.cgi - view any file on server 243. webmin 0.84 leaves its login/password in a MIME encoded environment variable 244. web_store.cgi read arbitrary files 245. CGI/Perl Hacking 246. Safe CGI Programming 247. A1Stats CGI view files, overwrite files bug 248. Active Classifieds Free Edition 1.0 CGI fails to authenticate administrators 249. AdCycle up to 1.15 does not properly validate user input 250. 1C:Arcadia Tradecli.dll Show Path, Read Arbitrary Files, DoS 251. Basilix Webmail System - read any file, run PHP programs 252. Carello E-Commerce for NT 1.2.1 - Execute arbitrary code with Web Server privileges 253. DCShop can be made to give out customer credit cards in plain text 254. ePerl can be made to process untrusted files 255. FormMail.pl - spam anonymously 256. Gnatsweb.pl unchecked user input 257. Interactive Story 1.3 read arbitrary file 258. MP3Mystic dot-dot directory traversal 259. Paper: PHP common vulnerabilities 260. phpMyAdmin and phpPgAdmin insecure include() calls 261. phpSecurePages remote command execution vulnerability 262. PHPSlash - url scheme integrity not checked 263. PHProjekt directory traversal 264. SquirrelMail webmail Insecure include() calls 265. Twig 2.6.2 free webmail system Unquoted SQL Query String problem 266. BadBlue 1.0 Beta retrieve PHP source 267. CFDecrypt - Decrypt Cold Fusion templates encrypted with CFCRYPT 268. Baltimore Technologies WEBSweeper 4.02 bypass malicious tags 269. DCShop - retrieve cleartext credit cards 270. E-smith - insert accounts that are invisible to admin 271. Entrust execute arbitrary code 272. Surf-net ASP forum really weak "security" 273. SIX-webboard .. and / not processed 274. phpBB 1.4.0 backslash problem 275. phpBB 1.4.0 run arbitrary code 276. phpBB 1.4.0 input validation attack BBS 277. DCForum - attacker can create admin account! 278. O'Reilly WebBoard 4.10.30 execute arbitrary javascript on remote machine 279. A More Stealthy way to Hack a Wildcat BBS 280. CGI-Exploit Scanner 281. cgicheck99 0.4 282. Cgichk 283. cgiscan.c 284. Guile 3.1 CGI Scanner 285. Malice 286. Perl CGI Checker 287. Tools Information :: Web Site Hacking :: Audit Tools 288. Buffer Overflow in AOL ICQ 289. webmasters can force themselves into Contact list 290. ICQ Protocol Version 5 - Part 1 291. ICQ Protocol Version 5 - Part 2 292. Hacking Techniques and Methods ICQ 293. ICQ Protocol 294. Excryption and Checkcode of the ICQ Protocol V3 and V4 295. ICQ Protocol Decoder 296. Unofficial ICQ V3 Specification 297. ICQ V4 protocol early analysis notes - Part 1 298. ICQ V4 protocol early analysis notes - Part 2 299. ICQ V4 protocol early analysis notes - Part 3 300. ICQ V4 protocol early analysis notes - Part 4 301. Updated description of the ICQ V4 Protocol 302. ICQ V4 protocol analysis notes - Part 1 303. ICQ V4 protocol analysis notes - Part 2 304. mIRC 5.41 DoS 305. AntiBot TCL Script for channel protection 306. AIM Secrets 307. NetQuake Server DoS 308. Quake 3 Arena 1.29f/g segfault exploit 309. CIAC M-007 Macintosh OS-X App Mgr Vulnerability 310. CIAC M-013 Mac OS X Downloading Applications Vulnerability 311. MacAdministrator hidden files problems 312. MacOS X permissions corruption 313. PWS 1.5.5 password field input overflow 314. Security Analysis of the Palm Operating System 315. Tektronix (Xerox) PhaserLink Webserver security through obscurity 316. Code Red can crash HP JetDirect printers 317. 3Com Netbuilder II SNMP ILMI undocumented Community 318. 3COM hardware - inadequate brute force attack protection 319. 3Com Officenet DSL Router crash 320. Allied Telesyn AT-AR220e DSL/Cable Router virtual server insecurity 321. Cayman-DSL nmap scan crash 322. NetApp NetCaches tunneling vulnerability 323. NetGap - bypassing filter engine 324. Multiple RADIUS Implementations - buffer overflows 325. Cisco vpn3000 concentrator vulnerability 326. Cisco content services switch user account 327. Cisco catalyst 5000 series vulnerability 328. Cisco IOS BGP Attribute Corruption Vulnerability 329. Cisco Content Services Switch ftp Vulnerability 330. Cisco Multiple Vulnerabilities in CBOS 331. Cisco IOS Reload After Scanning Vulnerability 332. Cisco 11000 Series Switch Web Management Vulnerability 333. Cisco IOS HTTP Authorization Vulnerability 334. Cisco IOS HTTP Authorization Vulnerability 335. Cisco SN 5420 Storage Router Vulnerabilities 336. Cisco Catalyst 2900XL - crash with an empty UDP packet 337. Cisco HSRP DoS 338. Cisco Content Service Switch 11000 Series FTP Privilege error 339. Cisco CBOS 2.x Multiple Vulnerabilities 340. Cisco IOS 12.1(2)T, 12.1(3)T memory error can cause reload 341. Cisco Content Service Switch 11000 Series failure to enforce restrictions for accessing web management URL 342. Cisco 6400 NRP2 Telnet telnet access with no password set 343. Cisco IOS 11.3 and later - execute arbitrary code 344. Cisco SN 5420 Storage Routers DoS, unrestricted low level access 345. Cisco PPTP vulnerability 346. Anti-Spoofing rules generator for Cisco boxes 347. Cisco Catalyst 5000 switch compatibility crash 348. Cisco Local Director Denial of Service 349. Cisco SN 5420 Storage Routers Denial of Service 350. Cisco IOS HTTP Server Authentication Vulnerability 351. Cisco Secure IDS Signature Obfuscation Vulnerability 352. Cisco - Multiple Vulnerabilities in ACL Implementations 353. Starfish Truesync Desktop + REX 5000 Pro two vulnerabilities 354. 802.11b Access Point Devices - WEP Encryption Key divulged 355. 802.11b Access Point Devices (many vendors) authentication mechanism flaw 356. Wireless LAN sniffing 357. 802.11b (WiFi) Security Update 358. Wireless LAN Security 359. Ultra-Mini Gay HOWTO - Dialout/PPP on Shiva LANRovers
.:: E. Computer Security Information ::. 1. Firewalls Torn Apart 2. Guide To Social Engineering 3. Social Engineering And Email Account Cracking 4. Network Firewall Security 5. Hijacking Hotmail Accounts For Newbies 6. Various Ways To Hack Or Over Ride Foolproof 7. Configuring ZoneAlarm Securely 8. IP Masquerading Tutorial 9. Interesting Things You Didnt Know About Your Computers Hardware 10. Advanced Number Systems Made Easy 11. Hacking Dictionary 12. Hacking The Bios 13. DNS The What The How And The Why 14. Exploit Mihirs Guide To Inserting Logo To System Properties 15. Getting Geographical Information Using An IP Address 16. Create A Lightweight E Mailer 17. Telnet Explained 18. Installing A Webserver For NewbiesI 19. The IP Address 20. Being A Hacker On The Meaning Of Being A Hacker 21. Well Known Port Numbers 22. Samba How To 23. Removing Banners 24. Port Numbers Part 1 25. Port Numbers Part 2 26. Port Numbers Part 3 27. Port Numbers Part 4 28. Port Numbers Part 5 29. Port Numbers Part 6 30. Port Numbers Part 7 31. Port Numbers Part 8 32. Port Numbers Part 9 33. The OSI Model 34. The Basic Elements Of Cracking 35. Beginners Step By Step Security Guide 36. Linking Rules For Hacking And Other Alternative Websites 37. Installing A Webserver For Newbies 38. Glossary 39. Wireless Security And Hacking 40. Wireless Network 41. Demystifying Remote Host Part 1 42. Exploiting Design Flaws In The Win32 API For Privilege Escalation 43. Wireless LAN Technologies and Windows XP 44. Understanding NetBIOS 45. The Complete Guide To Computers 46. Things You Need 47. How To Clear The Past Mapped Network Drives List 48. You Got This File From 49. Msn Tutorial Ugw Securtiy Information Base 50. The Basics Of Cryptography 51. PGP Encryption For Beginners Learn How PGP Works 52. Cryptography FAQ 53. Cryptography Split Wide Open 54. W2K File System 55. A More Indepth Article About The Basics To Encryption 56. Protecting Your Scripts 57. Breaking Script Encoder 58. Windows 2000 Encrypting File System And Disk Wipe Software Vulnerability 59. Buffer Overflow Basics 60. Deadly Dos Attack 61. MS Office XP The More Money I Give To Microsoft The More Vulnerable My Windows Computers Are 62. Dos Attacks Explained 63. Introduction To Denial Of Service 64. Miscellaneous Groups Publications 65. Documents About General Hardening 66. Documents About Unix Hardening 67. Basic Steps To Hardening A Standalone Windows 2000 Installation 68. Setting Up IIS And Securing Streamed Content 69. Articles On How To Securing Hardening BSD 70. Step By Step Guide To Secure Win2k 71. Documents About Windows9x ME Hardening 72. Documents About General Hardening 73. Securing Your Web Pages With Apache 74. Documents About Windows9x ME Hardening 75. Documents About IIS Hardening Securing 76. Basic Steps To Hardening A Standalone Windows 2000 Installation 77. Excellent Analysis Of The ICQ Trojans 78. The ICQ Security Tutorial 79. Backing Up Your ICQ Contact List And Settings 80. Hijacking ICQ Accounts in Spanish 81. ICQ Password Stealing Tutorial 82. The ICQ Password Securing Tutorial 83. Hijacking ICQ Accounts 84. Back Door Infecting Guide 85. Security Home 86. Get ICQ Passwords Using Share Programms 87. Snort On Windows 98/ME/NT4/2000 Using Mysql And Acid 88. Eggdrop Bots Tutorial Written by The Cyber God 89. Eggdrop Bots Tutorial 90. Getting Passwords Of Nicks In mIRC 91. IRC Spoofing 92. The IRC Warfare Tutorial Written 93. IRC Trading Security 94. Getting Passwords Of Nicks In mIRC 95. IRC Basic Commands 96. Never Be Banned In IRC 97. IRC FAQ Undergroundworld de vu the Secure-Net Search Lab 98. A Better Way To Get Hotmail Passwords - A Little Helpful Program With A Short Tutorial 99. Newbie Keyloggers Toturial - How To Disable The Keyloggers 100. Tutorial To Make Your Folder (Any ) Secure And Inaccessible By Others Without Using Any Program 101. A Trick To Get Access To Control Panel As A Restricted Network User On Windows XP And 2000 102. Removing The Folder Having ASCII Character From The Drive 103. Getting Rid Of The Urls You Visited In The Url Bar Of IE 104. Exploring Windows 105. Create Your Own Logon Message 106. MSN Mesenger Tip 107. Writing MBR When Norton Antivirus2002 Has Auto-Protection Enable 108. Trick on CNN.COM or tricking minds via cnn.com 109. Access The Blocked Folder In WinNt 110. Various Methods Of Hacking Hotmail 111. Writing Bootable CD's With Nero 112. How To Protect A Folder From Access From Anyone, Even Your Administrator 113. How To Change Product Key In XP With No Re-Install 114. No More Popups 115. Tips And Tricks On Burning 116. The Elite Symbols 117. Windows Xp Product Key Modifier 118. Hacking Hotmail 119. Kazaa As A Annonymous Emailer 120. Cracking Unix Password Files For Beginners 121. Exploiting Cisco Systems 122. Cracking Unix Password Files For Beginners 123. Poor Security On Default Windows 2000 Server Installation Could Lead To Unauthorized Database Access 124. Remote Control Of IIS Windows 125. How To Become A Hacker 126. Features of Postal Nemesis 127. Gathering Info On A Host - The Essential Ingredient For Getting Root Or Admin 128. What System Administrators Fear 129. Munga Bunga's HTTP Brute Forcer 130. Port Scanning: Is it illegal? 131. Microsoft Internet Information Services Local And Remote Dos 132. Netbios Based Hacking Tutorial 133. Languard Network Scanner Basics 134. IIS Allows Universal Cross Site Scripting 135. All Versions Of Microsoft Internet Information Services Remote Buffer Overflow (SYSTEM Level Access) 136. Simple Guide For Opening Files Locked 137. Getting Through An Access Database Password 138. Shell Accounts For Newbies 139. Admin Access In A Locked Environment 140. Info Gathering Tutorial 141. Introduction To Buffer Overflow 142. Using Nbstat/Netbios To Your Advantage 143. Buffer Overflows-Getting Started 144. Default Password Paths 145. Tutorial About Netbios 146. How To Write Format String Exploits 147. Unchecked Buffer in ISAPI Extension Could Enable Compromise of IIS 5.0 Server 148. Anonymity Tutorial 149. How The NSA Is Monitoring You 150. Proxy/WinGate/SOCKS Tutorial 151. Introduction To Webmin 152. Exploiting IPC Share 153. Cryptic Windows Errors 154. Fun With Debug 155. What Is The Ntregistry 156. Untold Secrets 157. Beginners Guide To Linux - Easy Installation Guide 158. Another Registry 159. File And Printsharing 160. Windows 98 Security Issues 161. Poledit 162. Creating Files In Windows That Begin With A Dot 163. Creating Hidden Folders Without Filenames Made EZ 164. Remote OS Detection 165. Hacking A Windows 2000 System Through IPC$ 166. Hacking/Cracking Iis 4/5 167. How To Hack Windows XP Admin Passwords 168. Generel Bugs In Iis 4-5-5.01 169. Installing Apache On Windows 170. Installing 2K 171. Foolproof 172. Fooling Foolproof 173. How To Make Simple DOS Batchfiles 174. How To Protect A Folder From Access From Anyone, Even Your Administrator 175. How To Change Product Key In XP With No Re-Install 176. Defeat Foolproof 177. Removing Outlook 2002 XP Attachment Security 178. Running Programs Trough The Run Feature 179. Why Openbsd Will Never Be As Secure As Linux 180. Basic Security - Windows ME 181. A Review Of Lindows 182. 95-98 Local Hacking 183. Inside Windows XP Product Activation 184. What's New For The Windows 98 Startup Disk 185. Attachment File Types Blocked By MS Office XP Outlook 186. Advanced DOS Techniques 187. Windows File/Printer Sharing Explained 188. Microsoft IIS Unicode Exploit Explained 189. Useful DOS Commands (Mainly For Newbies) 190. Hacking The Hash - Hacking Windows 2000 and XP Passwords 191. Real Desktop Items, Not Shortcuts 192. Microsoft Explorer html-based folders (Level= Script Kiddie) 193. Access To Other Restricted Users Folders In Winxp/2K 194. Common Files Of The /Etc Directory And Their Uses 195. Writing Your Own Operating System 196. Hiding Things From Other Windows Users 197. Changing Startup/Shutdown Logos The Easy Way 198. Linux Security For Newbies 199. NetBIOS Vulnerability 200. WHAT Will Microsoft Think Windows Exposed 201. Windows Hacking 202. Windows XP Explained 203. Unaccessible Dirs/FILES From [Another Method] [ONLY WORKS IN WINDOWS Older Than XP] 204. How To Look At Someones Desktop In XP 205. Why Linux Will Never Be As Secure As Open bsd 206. Hack Into Windows Network 207. Sendmail And Beyond: Kewl Tips And Tricks 208. What Is The POP3 Protocol 209. Various Send Mail Holes - Part 1 210. Various Send Mail Holes - Part 2 211. TCP\IP: A Mammoth Description 212. The Sendmail Tutorial 213. The FTP Tutorial 214. The FTP Tutorial 215. Giving the Finger to port 79 / Simple Finger Deamon Tutorial by Paris2K 216. Sendmail Tutorial Version 1.1 - (UGW Securtiy Information Base) 217. FakeMail - How to Send Fake Mail Using SMTP Servers 218. TCP Wrappers Disclosed 219. Register Modfying - A Must Read For Every Cracking Newbie 220. Cracking "Customizer 2000 for w9x/me ver. 6.5.3" 221. Cracking "Sweet Little Piano v1.83" 222. New Tech Hacks Crack 223. The Crack Tutorial - Part 1 224. The Crack Tutorial - Part 2 225. Illegal XP Owners Beware, Microsoft Has Quite A Suprise Planned 226. Newbies First Class 227. MS Windows 2000 TCP/IP Implementation Details - Part 1 228. MS Windows 2000 TCP/IP Implementation Details - Part 2 229. MS Windows 2000 TCP/IP Implementation Details - Part 3 230. MS Windows 2000 TCP/IP Implementation Details - Part 4 231. MS Windows 2000 TCP/IP Implementation Details - Part 5
.:: F. Phreaking Information ::. 1. Updates for the alt.phreaking FAQ 2. The New AT&T Network 3. Rebuttal of "The Scariest Number In The World" 4. FCC Part 68 FAQs 5. Sniper's Guide to Telstra LPR Traces 6. Hacking K-Mart's Phone System 7. 1-400 Phone Numbers 8. Usenet thread on DATU passes 9. Phone-Computer on Playing Around 10. Free 976 Number Hack 11. The Guide to Mostly Chirpy Phreaking Part 1 12. The Guide to Mostly Chirpy Phreaking Part 2 13. The Guide to Mostly Chirpy Phreaking Part 3 14. New School Phreaking 15. PBX's and WATS 16. Madrox's guide to... Extender and PBX hacking 17. Telephone Frequency and Crystal Tutorial 18. Technician Ring Back Numbers 19. Trucking/Trashing 20. DATUs Explained 21. Teletech (Itron) Telco truck terminal system 22. Anoy-O-Phone 23. Oncore Communications Exploit Type Thingy 24. Trashing locations in Manchester 25. BT Lineboxes 26. UK Phone Phreaking FAQ 27. BT's Exchange Test Numbers 28. BT Dial Codes 29. Call Logging FAQ 30. BT Basics 31. MED Guide to UK Telephonics 1 32. MED Guide to UK Telephonics 2 33. The analogue T.X.E. Switch 34. Free Calls from a Taxi Fone 35. BT Wiring Cabinets 36. DATU 37. Agilent/AT&T Extender Manipulation 38. Updated LASS Codes 39. Dealing with PBX/CPE Fraud 40. Telephone Systems Security Guidance Notes 41. Swiss Telecom Info 42. Gold Phoning 43. Phreaker's Phun House 44. Setting up an Alliance Meet-Me Conference 45. Cosmos 1 46. Cosmos 2 47. The 1986 COSMOS Philes Part 3: Service Order Input 48. Rules of Phreaking : plus several dozen k of interesting stuff from 1986 49. The IKZ-50 System 50. South African Phreaking technique 51. ANAC in South Africa 52. Various Phone Warez 53. Just how stupid Diana PABX's are 54. Vulnerabilities and Security Limitations of Current IP Telephony Systems 55. Compromsing Voice Messaging Systems 56. Hacking Voice Mailboxes (largely stolen from Cyber Thief) 57. How To Phreak Answering Machines 58. Vodacom VMB Hacking 59. MTN Voicemail Hacking 60. More Vodacom VMB Hacking Nonsense 61. The Index-By-Color of The Fixer's 2K1 Box Review! 62. The Fixer's 2K1 Box Review - Part 1 63. The Fixer's 2K1 Box Review - Part 2 64. Blue Box Interest: "A Phreindly Phile" - early boxing text 65. What Can I Do With a Blue Box? 66. Blue Boxing Numbers : Yes, toll free numbers that can still be boxed from! 67. Can Blue Boxing Be Achived in the UK? 68. Blue Boxing, po-russki 69. Blue Box Interest : C5 Worldwide Results List (from Switzerland) 70. Criticism of the Red Box FAQ 71. Updates for the alt.phreaking FAQ 72. Revised Red Box 73. It's Too Fucking Cold To Beige Box Box 74. Emergency "Box" 75. Beige Boxing Techniques 76. The Complete Lamer's Guide to Pillboxin' 77. The Sonik Box : Use headphones instead of a phone when beige boxing 78. Beige Box Plans 79. Introduction to Phone Taps 80. Beige Boxing in South Africa 81. More Beigeboxing Methods 82. The Privacy Box 83. Telezapper Box - Disable telemarketing predictive dialers 84. Invisible Box : Prevent In-Use Lights from Lighting 85. The Crimson Box Explained : (Hold Button) 86. Advanced Click Box : Frees busy lines 87. Click Box - Frees busy lines 88. Idiotic Box 89. Toast Box 90. Poor Man's Electro-Bastard Box 91. Click Box - Frees busy lines 92. Cheaply Made Phone Tap 93. The Tone Box : Create static on target line 94. The Mirror Box, a correction 95. 9V Busy Box 96. Blue Boxing Australia 97. Beige and Buzy Box 98. Blue Box in the USA 99. Raven Box 100. NeonRock Box 101. The end of ACTS 102. Slugging 103. How to get Free Local Calls on New Payphones 104. Payphone Calls are Free 105. New Jersey Payphones 106. Free Calling from Payphones - it's easier than you think! 107. Everything you really never wanted to know about coin services 108. Oxford Payphones 1.0 109. Payphones - Cash and Free Calls 110. COCOTs: What the hell are they anyway? 111. COCOTs which were untouchable are no more!
.:: H. Law, Privacy, Wetware, Hardware, File Sharing ::. 1. Making a listening device out of a plunger 2. The Millibug 3. The Down-Low on Trunking 4. Logitech wireless desktop (mouse, keyboard, receiver) RF interception 5. Model 170 Card Reader Reverse Engineering 6. Easy-To-Make Anti-Tampering Circuits 7. A Close Look at Speed Traps 8. Mousetrap SmartCard Reader! 9. Poor Man's Boards 10. EFF Alert on the proposed Security Systems Standards and Certification Act 11. USACM letter to Sen. Hollings criticizing draft SSSCA bill 12. Leaked documents allegedly reveal RIAA assault on peer-to-peer 13. Mad As hell about the DMCA 14. City of Tampa fails to shut down Voyeur Dorm adult site 15. San Francisco bans filters in libraries -- nevermind the Feds 16. IETF Internet Draft: Why .xxx domain is a very bad idea 17. The RIAA's threatening letter to Professer Felten who helped crack SDMI and was to publish his findings 18. A letter from the US Department of Justice to consultant accused of hacking Brian K. West 19. Peter Swire on ATA bill, computer hacking, and life in prison 20. The ACLU on the serious civil rights impact of the new compromise anti-terrorism legislation 21. Attorney General John Ashcroft opposes any sunset clause for anti- terrorism legislation 22. News article: PATRIOT act goes ahead 23. How a major industry organization tried to legalize hacking 24. Fallout from the RIAA's attempt to legalize hacking 25. Various college policies on anonymous/pseudonymous mail and news posting 26. Canada's justice minister preparing bill to limit encryption 27. The newest cyber-crime: Politically Incorrect Speech 28. Sen. Ron Wyden calls for Emergency Technology Corps 29. Forwarding email without permission illegal in Australia 30. Make Money Fast! By suing spammers? 31. KaZaA 1.3.1 + Morpheus 1.3 Sharing problems 32. Nudester 1.10 shares whole hard disk 33. Obtaining and understanding your FBI File 34. Canada's privacy commish: Video surveillance a "threat" to privacy 35. More on national ID card and use in western Europe 36. Visionics facecam firm says tech is perfect for airports 37. The South African Identity Document Number System 38. Social Insurance Number Checksums 39. Privacy Digest 10.04 Jun.09/01 40. Privacy Digest 10.05 Jun.23/01 41. Privacy Digest 10.06 Aug.22/01 42. Privacy Digest 10.07 Aug.28/01 43. Privacy Digest 10.08 Sep.06/01 44. Privacy Digest 10.09 Sep.23/01 45. Privacy Digest 10.10 Oct.22/01 46. HumanClick Exposed! 47. HTML WebBugs 48. Robert Hanssen's last letter to his Russian handlers 49. ESP of Espionage - Have the Russians and CIA been working on the ultimate Wetware hack? 50. Social Engineering Fundamentals - Part I 51. Social Engineering Fundamentals - Part II 52. Social Engineering 53. Fooling people on IRC into running Programs 54. Getting free hard drives! 55. Alpha (personalities) are the best liars? 56. Internet Mind Games 57. How to Outfox PBX Fraud 58. What is Body Language? 59. How to win Arguments or make everyone see your side 60. Social Engineering Sears 61. Tips on finding chicks to pick up 62. FAQ on the "Mystery Method" of picking up women 63. Being Sociable 64. Psychological Profile of the Troubled Female Teen 65. A guy's seduction efforts on an Alpha bitch 66. The SMS Callback Scam 67. Programming ADT Alarms 68. Fundamentals of Electronic Lockpicking 69. The Amtel 2000 Tele-Entry System 70. How to get Credit Card Numbers the Easy Way! 71. Arcade Machines 72. Ripping off your local Arcade 73. Soda Machines 74. Vending Machine Hacking for the New Millennium: Soda Machines 75. Vending Machine Picking 76. How unsavory kids "Get Shit For Free" 77. Free Cola! 78. An email to reply spammers with 79. Script Kiddies: How to be one, and be loathed by your peers 80. SKip Diving 81. Hacktivismo 82. Dr. Seuss Explains why Computers Sometimes Crash 83. Who is 2600? A quick lookup 84. The Linux Cult 85. Hacking: A Way to Live 86. A brief history of the Usenet Meowers 87. Imitation Operator from Hell 88. Pranks at Microsoft 89. Breaking AOL's Grip 90. Xanadu publishing system 91. How to be K-Rad on alt.phreaking 92. How to make your own Internet Radio Show 93. The l33t ph1l3z 94. Hackers and the Media
.:: I. The Standards That Define The Internet ::. 1. Tekelec's Transport Adapter Layer Interface - Part 1 2. Tekelec's Transport Adapter Layer Interface - Part 2 3. Tekelec's Transport Adapter Layer Interface - Part 3 4. Tekelec's Transport Adapter Layer Interface - Part 4 5. RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed - Part 1 6. RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed - Part 2 7. RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed - Part 3 8. RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed - Part 4 9. RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed - Part 5 10. RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed - Part 6 11. RObust Header Compression (ROHC): Framework and four profiles: RTP, UDP, ESP, and uncompressed - Part 7 12. Requirements for robust IP/UDP/RTP header compression 13. RSVP Cryptographic Authentication -- Updated Message Type Value 14. How to Advertise Responsibly Using E-Mail and Newsgroups or - how NOT to $$$$$ MAKE ENEMIES FAST! 15. Realm Specific IP: Framework 16. Realm Specific IP: Protocol Specification - Part 1 17. Realm Specific IP: Protocol Specification - Part 2 18. RSIP Support for End-to-end IPsec 19. Finding an RSIP Server with SLP 20. ECML v1.1: Field Specifications for E-Commerce 21. Carrying Label Information in BGP-4 22. Conventions for the use of the Session Description Protocol (SDP) for ATM Bearer Connections - Part 1 23. Conventions for the use of the Session Description Protocol (SDP) for ATM Bearer Connections - Part 2 24. Conventions for the use of the Session Description Protocol (SDP) for ATM Bearer Connections - Part 3 25. Conventions for the use of the Session Description Protocol (SDP) for ATM Bearer Connections - Part 4 26. Conventions for the use of the Session Description Protocol (SDP) for ATM Bearer Connections - Part 5 27. Request to Move STD 39 to Historic Status 28. RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System (DNS) 29. Service Location Protocol Modifications for IPv6 30. LDAP Authentication Password Schema 31. 3GPP-IETF Standardization Collaboration 32. Mobile IP Vendor/Organization-Specific Extensions 33. Methodology for ATM Benchmarking - Part 1 34. Methodology for ATM Benchmarking - Part 2 35. Methodology for ATM Benchmarking - Part 3 36. Methodology for ATM Benchmarking - Part 4 37. Methodology for ATM Benchmarking - Part 5 38. On the Design of Application Protocols 39. Authentication for DHCP Messages 40. A More Loss-Tolerant RTP Payload Format for MP3 Audio 41. A URN Namespace for XML.org 42. A URN Namespace for OASIS 43. Extensions to IPv6 Neighbor Discovery for Inverse Discovery Specification 44. A DNS RR Type for Lists of Address Prefixes (APL RR) 45. The Congestion Manager 46. Electronic Signature Policies - Part 1 47. Electronic Signature Policies - Part 2 48. Electronic Signature Formats for long term electronic signatures - Part 1 49. Electronic Signature Formats for long term electronic signatures - Part 2 50. Electronic Signature Formats for long term electronic signatures - Part 3 51. Electronic Signature Formats for long term electronic signatures - Part 4 52. Authentication, Authorization, and Accounting: Protocol Evaluation - Part 1 53. Authentication, Authorization, and Accounting: Protocol Evaluation - Part 2 54. Authentication, Authorization, and Accounting: Protocol Evaluation - Part 3 55. Protection Against a Variant of the Tiny Fragment Attack 56. Requirements for Kerberized Internet Negotiation of Keys 57. Notes from the State-Of-The-Technology: DNSSEC 58. Dormant Mode Host Alerting ("IP Paging") Problem Statement 59. Terminology for Frame Relay Benchmarking 60. Terminology for ATM ABR Benchmarking 61. Performance Enhancing Proxies Intended to Mitigate Link-Related Degradations - Part 1 62. Performance Enhancing Proxies Intended to Mitigate Link-Related Degradations - Part 2 63. The SPIRITS Architecture 64. OSPF Stub Router Advertisement 65. Extended Assignments in 233/8 66. Requirements for Configuration Management of IP-based Networks 67. Per Hop Behavior Identification Codes 68. CDMA2000 Wireless Data Requirements for AAA 69. An IPv6-to-IPv4 Transport Relay Translator 70. Known HTTP Proxy/Caching Problems 71. Remote Monitoring MIB Extensions for Interface Parameters Monitoring 72. L2TP Disconnect Cause Information 73. Transmission of IPv6 Packets over IEEE 1394 Networks 74. Generic Routing Encapsulation over CLNS Networks 75. A Framework for Defining Empirical Bulk Transfer Capacity Metrics 76. MGCP Business Phone Packages - Part 1 77. MGCP Business Phone Packages - Part 2 78. End-to-end Performance Implications of Slow Links 79. A URN Namespace for Public Identifiers 80. Delegation of IP6.ARPA 81. PPP Multiplexing 82. Requirements and Functional Architecture for an IP Host Alerting Protocol 83. End-to-end Performance Implications of Links with Errors