1. HACKERS - Learn what Hackers know, how they do it, and what you can
do to keep your system safe

1.1 GENERAL - General Hacking Information
1.1.1 General Security Concepts
1.1.2 Antique Systems
1.1.3 Oracle
1.1.4 Tools, Advisories and Exploits affecting multiple platforms
1.1.5 PC Software & BIOS Hacking
1.1.6 Truly Miscellaneous Hacking Info

1.2 PASSWORDS - Password Security
1.2.1 Password Hacking
1.2.2 Password Generators
1.2.3 Password Security Audit Programs
1.2.4 Word Lists

1.3 SCANNING - Scanning, Fingerprinting and similar techniques
1.3.1 Network Scanning
1.3.2 "Wargames" Modem Carrier Scanning
1.3.3 Fingerprinting
1.3.4 Sniffing

1.4 INTERNET - How Hackers Attack Numerous Internet Services
1.4.1 Denial of Service Attacks
1.4.2 Email & News
1.4.3 Proxies & IP Spoofing
1.4.4 DNS and BIND
1.4.5 SPAM
1.4.6 FTP
1.4.7 General Unsorted Information
1.4.8 Indispensible Internet Utilities
1.4.9 Cable & DSL Info & Hacking

1.5 WEB - How Hackers Attack Web Servers, CGIs, PHP, ASP, etc.
1.5.1 Web Site Hacking - General & Miscellaneous
1.5.2 Web Site Hacking - Specific Sites
1.5.3 Web Site Hacking - Servers
1.5.4 Web Site Hacking - CGI, Perl, ASP, PHP etc.
1.5.5 Web BBSes
1.5.6 Web Site Hacking - Audit Tools

1.6 IRC/ICQ/Etc. - How Hackers attack IRC, Instant Messaging, and
Multiplayer Games
1.6.1 ICQ Hacking
1.6.2 IRC Hacking, Scripts & Bots
1.6.3 AOL Instant Messenger (AIM)
1.6.4 Miscellaneous Chat/gaming Systems

1.7 MISC. - Vulnerabilities found in Platforms with Smaller Market
Share
1.7.1 Macintosh
1.7.2 PalmOS
1.7.3 Printers
1.7.4 Dedicated Network Appliances, Hubs, Routers, etc.
1.7.5 Cisco Equipment
1.7.6 Miscellaneous

1.8 NETWORKS - How Hackers Attack Novell and 802.11b Networks
1.8.1 Novell Networks
1.8.2 Wireless LANs
1.8.3 X.25 Networks
1.8.4 Miscellaneous Networking Information


2. PHREAKS - Phreaking - the black art of telephony - still alive 40
years and billions of dollars later

2.1 GENERAL - General Information About the Phone Company
2.1.1 Hacking Answering Machines & Voice Mail
2.1.2 Phreaking Programs

2.2 BOXES - Coloured "Boxes" - Electronic Toll Fraud & Other Phone
Devices
2.2.1 The Fixer's Box Review - Read this before you read the rest of
these files!
2.2.2 Blue and Green Boxes
2.2.3 Red Box
2.2.4 Beige & Bridge Boxes
2.2.5 Various new boxes
2.2.6 Programs to generate phreak tones

2.3 PAYPHONES - All about Payphones, COCOTs, BOCOTs, etc.
2.3.1 Payphones
2.3.2 COCOTs
2.3.3 Nortel/Quortech Millennium
2.3.4 Smart Cards/Phone Cards

2.4 CELLULAR - Cellular Telephones & the Hacking Thereof
2.4.1 Cellular Phones by Manufacturer
2.4.2 Miscellaneous Info
2.4.3 Miscellaneous Utilities

2.5 CALLER ID - Caller ID and ANI
2.5.1 Caller ID and CLASS
2.5.2 ANI & ANAC

2.6 NUMBERS - Scans, numbers of interest
2.6.1 Lists of Phone Numbers

2.7 SOUNDS - Sounds from the phone system
2.7.1 SIT Tones are said to thwart predictive dialers used by
Telemarketers!


3. PC - PC Hacking - Crypto, Virology, Cracking and Backdoors

3.1 CRYPTO - Cryptography, Cryptanalysis, Steganography
3.1.1 Crypto: PGP & GPG
3.1.2 Crypto: Cryptanalysis
3.1.3 Crypto: Steganography
3.1.4 Crypto: Miscellaneous
3.1.5 Misc. File Encryptors

3.2 VIRUS - About Viruses and Worms
3.2.1 Virus Info Files & Advisories
3.2.2 Worms
3.2.3 Virus/Worm Protection Utilities

3.3 BACKDOOR - Backdoors, Trojans and defenses
3.3.1 Back Orifice and BO2K
3.3.2 SubSeven and Addons
3.3.3 Other Remote Administration Tools
3.3.4 Trojan Detectors / Removers / Retaliators
3.3.5 Information Files


4. UNIX - Unix and Linux Hacking and Security

4.1 WARNINGS - Unix - Vulnerabilities & Advisories
4.1.1 Tutorials & Papers
4.1.2 Specific Exploits and Vulnerabilities

4.2 TOOLS - Unix - Security Tools
4.2.1 Unix Security & Audit Tools (Including IDS and Access Control
Tools)
4.2.2 Unix Log Analysis Tools
4.2.3 Unix Proxies, Firewalls & Accessories
4.2.4 Unix Miscellany

4.3 BSD - Unix - BSD, FreeBSD, etc
4.3.1 FreeBSD
4.3.2 BSD & Misc. BSD variants
4.3.3 BSD Security Tools
4.3.4 BSD Micro-distributions (under 2.88 MB)

4.4 SUN - Unix - Solaris, SunOS etc.
4.4.1 Solaris
4.4.2 SunOS
4.4.3 Cobalt Appliances
4.4.4 SunOS and Solaris Security Tools

4.5 ETC. - Unix - Other Flavors (Irix, HPUX, AIX etc)
4.5.1 SGI/Irix
4.5.2 HP-UX
4.5.3 AIX
4.5.4 SCO
4.5.5 Miscellaneous

4.6 LINUX Vulns. - Linux - Vulnerabilities & Advisories
4.6.1 Linux - General Hacking
4.6.2 Linux Application Exploits
4.6.3 Linux - Red Hat Specific
4.6.4 Linux - Debian Specific

4.7 LINUX Tools - Linux - Security Tools
4.7.1 Linux - Intrusion Detection
4.7.2 Linux - Access Control
4.7.3 Linux Log Analysis Tools
4.7.4 Linux Rootkits
4.7.5 Linux Proxies & Firewalls
4.7.6 Linux - General Security & Audit Tools

4.8 LINUX Dist. - Linux - Security-oriented mini- and micro-
distributions
4.8.1 DMZS-Biatchux
4.8.2 NSA Security Enhanced Linux
4.8.3 Linux Mini- and Micro-distributions
4.8.4 Applications


5. WINDOWS - Windows Hacking and Security

5.1 WARNINGS - Windows Vulnerabilities, Advisories, and even security
flaws introduced by so-called security
products!!!
5.1.1 Microsoft IIS Vulnerabilities
5.1.2 Microsoft FrontPage Vulnerabilities
5.1.3 Microsoft Internet Explorer Vulnerabilities
5.1.4 Windows Application Vulnerabilities
5.1.5 Windows Internet/Networking Vulnerabilities
5.1.6 Insecurities introduced by "security" programs!
5.1.7 Netscape Browsers
5.1.8 Windows Hacks - Miscellaneous

5.2 TOOLS - Windows Security & Auditing Tools
5.2.1 Windows Registry Tools
5.2.2 Windows & MSDOS Security & Auditing Tools
5.2.3 Windows Local Security
5.2.4 File/Disk/Log Shredders

5.3 ETC - Windows Miscellany
5.3.1 Raw Sockets & Custom Packet Building
5.3.2 A Few Little Extras for Microsoft "Fans"


6. STANDARDS - The standards that define the Internet

6.1 RFCs - Internet RFCs 3094 to 3195
6.1.1 Internet RFCs 3094 to 3195

6.2 OTHER... - Other Standards & Official Publications
6.2.1 US Department of Energy CIAC-2300 Documents
6.2.2 NIPC CyberNotes


7. MISC - Miscellaneous Information - Law, Privacy, Wetware, Hardware,
File Sharing and more

7.1 HARDWARE - Hardware, Electronics, Radio etc.
7.1.1 TEMPEST
7.1.2 Bugs & Listening Devices
7.1.3 Miscellaneous

7.2 LAW - Hackers and the Law
7.2.1 Copyright Law & Cases
7.2.2 Net Censorship
7.2.3 Cases involving 2600 Magazine
7.2.4 The SDMI affair
7.2.5 Brian West
7.2.6 September 11th Backlash Legislation
7.2.7 General Legal Bufu

7.3 NAPST*R - About Napster, Gnutella, and other File Sharing schemes

7.4 PRIVACY - About your dwindling privacy
7.4.1 Privacy Digest
7.4.2 Internet Privacy
7.4.3 Espionage
7.4.4 Privacy Deprivation Tools

7.5 WETWARE - The scariest directory on this CD - Wetware Hacking!
7.5.1 Social Engineering & NLP
7.5.2 Seduction
7.5.3 Miscellaneous Wetware Hacking

7.6 CRIME - Physical Security, Scams etc.
7.6.1 Physical Security and Countersecurity
7.6.2 Financial Crimes Detection and Prevention
7.6.3 Vending Machine Hacking

7.7 PERIODICALS - Hacker Publications
7.7.1 CIAC Notes
7.7.2 CRTC
7.7.3 F0rbidden Knowledge
7.7.4 Keen Veracity
7.7.5 Lexxicor
7.7.6 Midnight Hackers Private Club
7.7.7 Phrack
7.7.8 Risks Forum Digest
7.7.9 Scorpion
7.7.10 ToT - Tricks of the Trade
7.7.11 UP - Underground Periodical

7.8 MISC. - Stuff that just didn't fit anywhere else!
7.8.1 Truly Miscellaneous Stuff


8. UTILITIES - Essential Windows utilities


For more information, you can visit our website at : http://www.ilmuhacker.com

Best regards,

ilmuhacker.com


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Algorithm Geeks" group.
To post to this group, send email to algogeeks@googlegroups.com
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at http://groups.google.com/group/algogeeks
-~----------~----~----~----~------~----~------~--~---

Reply via email to