HACKING

Posted on 2006-03-27 09:36  A.Z  阅读(258)  评论(0编辑  收藏  举报

HACKING

These were the most advanced hacking documents I could find. They assume a minimum level of competency, such as having read Bruce Schneiers book on cryptography, and a working knowledge of assembly language and Unix programming.

Hacking is seductive to the young Christian warrior, because it seems to promise quick fixes. However, it is not only useless for God's purposes, it is counterproductive. By all means, learn about it. You need to know what it is capable of, and what its limits are. Use your knowledge to protect yourself and others. Rely on God, not yourself.

  1. The Hacker's Manifesto, by The Mentor. Peer into the mind of a hacker. Do you really want to be one?
  2. Chaffing and Winnowing: Confidentiality without Encryption, by Ronald L. Rivest, co-inventor of RSA encryption.
  3. Attacking FreeBSD with Kernel Modules - The System Call Approach, by pragmatic/THC.
  4. Description of Integer Overflow, by Paul Starzetz, from a posting to BUGTRAQ.
  5. The Internet Auditing Project, by Liraz Siri, in which a small team probes every IP address on the internet, describes a breathtakingly sophisticated and advanced break-in perpetrated on them, then describes their ultra-secure internet bunker.
  6. Complete Linux Loadable Kernel Modules - the definitive guide for hackers, virus coders and system administrators, by pragmatic/THC.
  7. Hacker Crackdown: Law and Disorder on the Electronic Frontier, by Bruce Sterling.
  8. How to write Buffer Overflows, by Mudge (L0pht).
  9. In the Beginning was the Command Line, by Neal Stephenson. A well written and highly entertaining introduction to engineering philosophy for non-technical and technical people alike.
  10. An Introduction To Executing Arbitrary Code via Stack Overflows, by QuantumG.
  11. A Method of Free Speech on the Internet: Random Pads, by David A. Madore.
  12. Prime Number Hide-and-Seek: How the RSA Cipher Works, author unknown.
  13. Programming with Libpcap: a PCAP Tutorial, by Tim Carstens. Learn how to write your own custom packet sniffer!
  14. "Reply-To" Munging Considered Harmful. An Earnest Plea to Mailing List Administrators, by Chip Rosenthal.
  15. Runtime Kernel Kmem Patching, by Silvio Cesare. Everyone says this is hard, or impossible, or impractical. Silvio shows that hotpatching a running kernel is doable, and shows you how.
  16. Solaris Loadable Kernel Modules - Attacking Solaris with loadable kernel modules, by Plasmoid/THC.
  17. Smashing The Stack For Fun And Profit, by Aleph One, from Phrack Volume 7, Issue 49.
  18. Underground, by Suelette Dreyfus and Julian Assange. True tales of hacker exploits, and detailed look at the parts of hacker culture most rarely seen.
  19. Writing Internet Worms For Fun And Profit, by Michal Zalewski, describing the construction of the ultimate worm.