Underground Text Files: JPG - 10k

---------------------------------------------------

Read, read, read, peruse, and read some more. They've been somewhat categorized for convenience, and there are many more out there that I have yet to post , but as I come across useful texts, you'll find them here. If you have one you think should be posted, feel free to send it my way...

Regards,
Silicon Toad

.ooO General Hacking | Cable TV | Cellular Phones | Phreaking | Unix | Viruses Ooo.

---------------------------------------------------

GENERAL HACKING

* 2600 Magazine: Various Excerpts (10k)
* Administrators Guide To Hacking (23k)
* Advanced Hacking: VAX's VMS (25k)
* Anarchist's Cookbook (297k)
* The Big Book of Mischief (185k)
* CNA: Numbers Listing (12k)
* Congress vs. Technology (7k)
* Cracking on the IBM PC (9k)
* Federal Government BBS Listing (14k)
* Hacking AT&T Answering Machines (2k)
* Hacking Compuserve Online (8k)
* Understanding Credit Cards: P1 (11k)
* Understanding Credit Cards: P2 (8k)
* Understanding Credit Cards: P3 (6k)
* DarkStorm's Book of Knowledge (57k)
* Intro to Denial Of Sevice[MISSING] (47k)
* DOD: Trusted Computer System Evaluation Criteria (59k)
* How 'Crackers' Crack (22k)
* How To Find Security Holes (17k)
* Government Computer Security Techniques (9k)
* Hacking GTE Telemail (17k)
* The Hacker Test (21k)
* Hacking: It's a state of mind! (6k)
* Hacking PC-Pursuit Codes (9k)
* Hole Listings (22k)
* Understanding IP Addressing (14k)
* The Inner Circle: Hacking Techniques (10k)
* International Directory of Hacking Organizations (13k)
* The Hacker's Jargon File (496k)
* Hacking RemoteAccess (13k)
* Live Social Engineering: The Camera Trick (5k)
* Introduction to Packet Fragmentation (5k)
* Telephone Loops Explained (9k)
* NSA Security Guidelines (54k)
* National Security Anarchists: P1 (13k)
* National Security Anarchists: P2 (11k)
* National Security Anarchists: P3 (16k)
* National Security Anarchists: P4 (29k)
* NFS Tracing By Passive Network Monitoring (35k)
* Understanding PPP (37k)
* popper Exploit Explained (3k)
* How Mitnick Hacked Tsutomu Shimomura with an IP Sequence Attack (19k)
* Sendmail 8.6.4: Obtaining a root Shell (8k)
* Telenet: The Secret Exposed (11k)
* Understanding PBX Systems (12k)
* Untraceable Electronic Mail, Return addresses, and Digital Pseudonyms (23k)
* The Social Organization of the Computer Underground: A Thesis (64k)
* A Guide to Internet Security: Becoming an UeberAdmin (9k)
* What You Should Know About Computer Viruses (18k)

---------------------------------------------------

CABLE TV GUIDE

* Cable TV Decoder Plans (4k)
* Cable Scrambling: Part 1 (4k)
* Cable Scrambling: Part 2 (7k)
* Cable Scrambling News (2k)
* Cable TV Scrambling Techniques (5k)
* The rec.video.cable-tv FYI (40k)
* The SSAVI Cable Scrambling System (8k)

---------------------------------------------------

CELLULAR ENLIGHTENMENT

* Cellular Secrets (61k)
* Cellular Carrier Codes (39k)
* Cellular Data: A Comparison of CDPD and Circuit Switched Data (29k)
* Cellular Telephony I (38k)
* Cellular Telephony II (77k)
* Cellular Phone Channel Construction (53k)
* Cellular Telephone Phreaking (16k)
* Digital Data Interpreter Test Set (8k)
* Ferguson BSB/D2MAC Baseband Decoder Modification (4k)
* Motorola Cell Phone Programming (39k)
* How To Build an ESN/MIN Snarfer (13k)
* The Wonderful World of Pagers (24k)

---------------------------------------------------

PHREAKING INFO

* The Myth of the 2600Hz Detector (7k)
* 2600 Hertz Single Tone Generator Schematic (2k)
* Dialout Information (14k)
* Field Phreaking II (21k)
* Hacking & Phreaking Numbers (76k)
* Helpful Scanning Tips (11k)
* The Motorola Bible v2.3 (39k)
* The Official Phreaker's Manual (172k)
* Phone Phreaking Tutorial (4k)
* Phone Systems Tutorial I (9k)
* Phone Systems Tutorial II (9k)
* Understanding PBX's and WAT's (11k)
* Voice Mail System Hacking (27k)

---------------------------------------------------

UNIX-FU

* Understanding Berkeley Unix v4.2 (14k)
* Unix Use and Security from the Ground Up (44k)
* Unix: A Hacking Tutorial (85k)
* Hacking Unix System V (11k)
* Useful Unix Hacking Commands (23k)

---------------------------------------------------

VIRUSES

* Anti-Anti-Virus Tricks v1.0 (21k)
* Black Book of Viruses (74k)
* Guide to the Selection of Anti-Virus Tools and Techniques (28k)
* Dark Angel's Phunky Virus Writing Guide: The Replicator (16k)
* Dark Angel's Phunky Virus Writing Guide: The Replicator II (29k)
* Dark Angel's Phunky Virus Writing Guide: Resident Virii (23k)
* EXE Infections : PART I (13k)
* EXE Infections: Part II (8k)
* Viruses: Assembly, Pascal, Basic & Batch (24k)

---------------------------------------------------

Home Top silicon@netwalk.com Disclaimer

Copyright © 1995-1997 Silicon Toad
Thou Shalt Not Copy
silicon@netwalk.com
Latest Revision: 01.Apr.1997

  _________.___.____    .____________  ________    _______
 /   _____/|   |    |   |   \_   ___ \ \       \   \      \
 \_____  \ |   |    |   |   /    \  \/ |   |    \  /   |   \
 /        \|   |    |___|   \     \____|   |     \/    |    \
/  _____  /|___|________|___|\________/\_________/\  __|__  /
| /     \/         [   T    O    A    D   ]        \/     \ |
|(                                                         )|
('                                                         ')