1
0
mirror of https://github.com/opsxcq/mirror-textfiles.com.git synced 2025-09-28 12:38:57 +02:00
Files
mirror-textfiles.com/hacking/UNIX.html

110 lines
14 KiB
HTML

<HTML>
<TITLE>T E X T F I L E S</TITLE>
<BODY BGCOLOR="#000000" TEXT="#00FF00" LINK="#00FF00" ALINK="#00AA00" VLINK="#00AA00">
<H1>Hacking Textfiles: UNIX </H1>
<P>
The UNIX operating system has gone through many different and interesting
incarnations since it was invented in the early 70's, but one thing is clear:
It's a real fun system for a hacker to play with. Once you get past the
initial halting steps of learning what you can do with it, UNIX provides
many avenues of exploration, and many opportunities to get it to do things
that the owners of the machine didn't expect you (as a user) to be able
to do.
<P>
What's interesting about technical files like those below is that the
authors will often give you a basic set of skills with UNIX before
immediately delving into the arcana and weirdness necessary to do the
trickery they're attempting. It must have made for a mighty odd way
to learn about an operating system for a young person on a BBS. Maybe
it was even the better way.
<P>
rm -rf .
<P>
<TABLE WIDTH=100%>
<TD BGCOLOR=#00FF00><FONT COLOR=#000000><B>Filename</B><BR></FONT></TD>
<TD BGCOLOR=#00DD00><FONT COLOR=#000000><B>Size</B><BR></FONT></TD>
<TD BGCOLOR=#00AA00><FONT COLOR=#000000><B>Description of the Textfile</B><BR></TD></TR>
<tab indent=60 id=T><br>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/admin2.txt">admin2.txt</A> <tab to=T><TD> 51966<BR><TD> Improving the Security of Your Site by Breaking Into It, by Dan Farmer and Wietse Venema
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/begin.txt">begin.txt</A> <tab to=T><TD> 85336<BR><TD> UNIX For Beginners Second Edition, by Brian W. Kernighan
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/berkly42.txt">berkly42.txt</A> <tab to=T><TD> 14848<BR><TD> Understanding the UNIX Operating System (Berkeley 4.2) Patched Together by The War
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/bestunix.hac">bestunix.hac</A> <tab to=T><TD> 7476<BR><TD> My Favourite UNIX Commands, By ZeeBee Australia Inc. 1990
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/betunix.txt">betunix.txt</A> <tab to=T><TD> 9517<BR><TD> Gaining Better Access On Any Unix System, by Doctor Dissector
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/bhacking.txt">bhacking.txt</A> <tab to=T><TD> 5898<BR><TD> A Beginner's Guide to Hacking UNIX by Jester Sluggo (October 8, 1985)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/bible.txt">bible.txt</A> <tab to=T><TD> 16109<BR><TD> A Unix "Bible" (Actually a Glossary
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/breinhar.txt">breinhar.txt</A> <tab to=T><TD> 37427<BR><TD> White Paper on UNIX Security Issues, by Robert B. Reinhardt, November 11, 1992
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/curry.txt">curry.txt</A> <tab to=T><TD> 140288<BR><TD> Improving the Security of your UNIX System, by David A. Curry (April, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/dirfind.txt">dirfind.txt</A> <tab to=T><TD> 4242<BR><TD> Newbie Tips: (Changing to / Hidden Directories) 1.html
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/hack.txt">hack.txt</A> <tab to=T><TD> 10708<BR><TD> Hacking Servers 101 by ChronicK of The E0D
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/hack1">hack1</A> <tab to=T><TD> 8753<BR><TD> UNIX Odds and Ends: Keeping Users Off the System
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/hack2">hack2</A> <tab to=T><TD> 11957<BR><TD> UNIX Trojan Horses
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/hack3.hac">hack3.hac</A> <tab to=T><TD> 7198<BR><TD> The Basics of Hacking, by The Knights of Shadow (VAXs/UNIX)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/hacking_unix.txt">hacking_unix.txt</A> <tab to=T><TD> 41819<BR><TD> An Indepth Guide to Hacking UNIX and the Concept of Basic Networking Utility by Red Knight of Phreakers/Hackers Undergound Network (June 10, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/hackunix">hackunix</A> <tab to=T><TD> 7408<BR><TD> How to Hack UNIX and VAX Systems by Thief and Wizard (1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/hackunix.txt">hackunix.txt</A> <tab to=T><TD> 41972<BR><TD> An Indepth Guide in Hacking UNIX and the concept of Basic Networking Utility by Red Knight of Phreakers/Hackers Underground Network (June 10, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/hide.hac">hide.hac</A> <tab to=T><TD> 4486<BR><TD> UNIX Abuse Collection, by ZeeBee Australia
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/hss.txt">hss.txt</A> <tab to=T><TD> 6292<BR><TD> Hacking Servers: A Beginner's Guide, by Lord Dredd
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/interunx.txt">interunx.txt</A> <tab to=T><TD> 355153<BR><TD> UNIX For Intermediate users
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/linux_mo.asc">linux_mo.asc</A> <tab to=T><TD> 4634<BR><TD> A Vulnerability in All known linux Distributions, by Bloodmask (August 13, 1996)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/maccrac.txt">maccrac.txt</A> <tab to=T><TD> 25503<BR><TD> SOFTDOCS: Maccrac Version 0.htmla by Ole Buzzard
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/metaunix.hac">metaunix.hac</A> <tab to=T><TD> 5970<BR><TD> A Beginner's Guide to Hacking Unix
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/muh.hac">muh.hac</A> <tab to=T><TD> 6400<BR><TD> A Beginner's Guide to Hacking UNIX By Jester Sluggo
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/nfstricks.txt">nfstricks.txt</A> <tab to=T><TD> 1944<BR><TD> A List of NFS Tricks by Lord Pyro
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/nis.txt">nis.txt</A> <tab to=T><TD> 1526<BR><TD> NIS Explained by Virtual Circuit and Psychotic
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/p500unix.txt">p500unix.txt</A> <tab to=T><TD> 34118<BR><TD> A Flaw in the Berkeley 4.3 UNIX Passwd Program, with Code and History
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/phelon1.txt">phelon1.txt</A> <tab to=T><TD> 9119<BR><TD> PHELON #1: Some Information About Unix (For Beginners)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/ports.txt">ports.txt</A> <tab to=T><TD> 1559<BR><TD> Some UNIX Ports and What to Do With Them
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/secdoc.hac">secdoc.hac</A> <tab to=T><TD> 156965<BR><TD> Improving the Security of your UNIX System, by David Curry
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/securesu.txt">securesu.txt</A> <tab to=T><TD> 29313<BR><TD> How to Improve Security on a Newly Installed SunOS 4.html.3 System by Thomas M. Kroeger (July 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/security.txt">security.txt</A> <tab to=T><TD> 154698<BR><TD> Improving the Securit of Your Unix System, by David A. Curry (April 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/sendmail.fun">sendmail.fun</A> <tab to=T><TD> 2313<BR><TD> A Little Sendmail Stuff, using the passwd file
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/sirsunix.hac">sirsunix.hac</A> <tab to=T><TD> 87805<BR><TD> UNIX: A Hacking Tutorial, by Sir Hackalot
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/sobunix.txt">sobunix.txt</A> <tab to=T><TD> 128483<BR><TD> UNIX and Today's Hacker by Syncomm of (SOB 513)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/socket.txt">socket.txt</A> <tab to=T><TD> 3164<BR><TD> The UNIX Socket Services
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/stupid.unx">stupid.unx</A> <tab to=T><TD> 10046<BR><TD> Yet Even More Stupid Things to Do With Unix! by Shooting Snark
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/sysadmin.txt">sysadmin.txt</A> <tab to=T><TD> 14091<BR><TD> Know your UNIX System Administrator
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/troj.hac">troj.hac</A> <tab to=T><TD> 4790<BR><TD> Basic Unix Use, by Lord Lawless
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/uhacknfo.hac">uhacknfo.hac</A> <tab to=T><TD> 497325<BR><TD> Security and the UNIX Operating System, 1990
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/uhcom.txt">uhcom.txt</A> <tab to=T><TD> 23536<BR><TD> A List of Some of the Most Useful UNIX Hacking Commands, and Some Hints on Their Usage
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unix-nas.txt">unix-nas.txt</A> <tab to=T><TD> 5084<BR><TD> UNIX Nasties by Shooting Shark (April 6, 1986)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unix-tro.txt">unix-tro.txt</A> <tab to=T><TD> 12412<BR><TD> UNIX Trojan Horses by Shooting Shark of Tiburon Systems (June 26, 1986)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unix.001">unix.001</A> <tab to=T><TD> 141735<BR><TD> UNIX Use and Security from the Ground Up by The Prophet (December 5, 1986)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unix.hal">unix.hal</A> <tab to=T><TD> 22197<BR><TD> A Guide to UNIX Systems Part I by Hackers Against Law Enforcements (September 1, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unix.inf">unix.inf</A> <tab to=T><TD> 14710<BR><TD> UNIX Primer and Command Reference by Frosty of Mechwarriors
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unix.info">unix.info</A> <tab to=T><TD> 4174<BR><TD> Things to Know about UNIX, by Sir Charles Hansen
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unix.sec">unix.sec</A> <tab to=T><TD> 120683<BR><TD> Improving the Security of your UNIX System, by David A. Curry (April, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unix.txt">unix.txt</A> <tab to=T><TD> 6016<BR><TD> The Fundamentals of UNIX Passwords, by Mr. Slippery
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unix.wek">unix.wek</A> <tab to=T><TD> 5248<BR><TD> Unix Conversions (From DOS to UNIX) by David Johnson
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unix001.hac">unix001.hac</A> <tab to=T><TD> 141523<BR><TD> UNIX Use and Security from the Ground Up, by The Prophet
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unix001.txt">unix001.txt</A> <tab to=T><TD> 138851<BR><TD> UNIX Use and Security from the Ground Up, by The Prophet (December 5, 1986)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unix1.hac">unix1.hac</A> <tab to=T><TD> 9992<BR><TD> Hackers Against Law Enforcement Present A Guide to UNIX Systems
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unix2.hac">unix2.hac</A> <tab to=T><TD> 11624<BR><TD> COSMOS, by Doctor Who
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unixacct.txt">unixacct.txt</A> <tab to=T><TD> 10995<BR><TD> Creating UNIX Accounts by the Kryptic Night and the Servants of the Mushroom Cloud
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unixart.hac">unixart.hac</A> <tab to=T><TD> 9099<BR><TD> Mitch Wagner of UNIX Today on an interesting Hacking Case
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unixcall.txt">unixcall.txt</A> <tab to=T><TD> 2048<BR><TD> Using UNIX to do an Outdial
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unixdos.fil">unixdos.fil</A> <tab to=T><TD> 3986<BR><TD> UNIX Conversions (The Filing System) by David Johnson
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unixgrou.txt">unixgrou.txt</A> <tab to=T><TD> 141649<BR><TD> Unix Use and Security from the Ground Up by The Prophet (December 5, 1986)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unixhak1.hac">unixhak1.hac</A> <tab to=T><TD> 5498<BR><TD> Tutorial on hacking through a UNIX system
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unixhak2.hac">unixhak2.hac</A> <tab to=T><TD> 12384<BR><TD> On the Security of UNIX
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unixhak3.hac">unixhak3.hac</A> <tab to=T><TD> 3971<BR><TD> Things to Know about UNIX by Sir Charles Hansen
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unixhck.hac">unixhck.hac</A> <tab to=T><TD> 5260<BR><TD> UNIX Hacking Made Easy by Shadow Lord
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unixhell.txt">unixhell.txt</A> <tab to=T><TD> 13528<BR><TD> Raising Hell with UNIX by the Kryptic Night
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unixhold.txt">unixhold.txt</A> <tab to=T><TD> 141525<BR><TD> Unix Use and Security From The Ground Up by The Prophet (December 5, 1986)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unixinfo.hac">unixinfo.hac</A> <tab to=T><TD> 3072<BR><TD> Unix System Basics by the Terminal Technician
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unixmyth.txt">unixmyth.txt</A> <tab to=T><TD> 14012<BR><TD> Is UNIX Really That Bad? The Myths of UNIX
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unixsec.txt">unixsec.txt</A> <tab to=T><TD> 28235<BR><TD> Imporving the Security of your UNIX System by David Curry (April 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unixsir.hac">unixsir.hac</A> <tab to=T><TD> 86374<BR><TD> UNIX: A Hacking Tutorial by Sir Hackalot
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unixsysv.hac">unixsysv.hac</A> <tab to=T><TD> 11408<BR><TD> Hacking UNIX System V
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unixsysv.txt">unixsysv.txt</A> <tab to=T><TD> 11197<BR><TD> How to Hack UNIX SYstem V (January 18, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unixtips">unixtips</A> <tab to=T><TD> 23535<BR><TD> A List Of Some OF The Most Useful UNIX Hacking Commands, and Some Hints On Their Usage
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unixtroj.hac">unixtroj.hac</A> <tab to=T><TD> 11958<BR><TD> UNIX Trojan Horses (A List)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/unix~1.txt">unix~1.txt</A> <tab to=T><TD> 34534<BR><TD> An Indepth Guide in Hacking UNIX and The Concept of Basic Networking Utility by Evil Ernie of No Lamers Allowed
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/virpassw.txt">virpassw.txt</A> <tab to=T><TD> 3780<BR><TD> The Passwords Used by the Internet Worm
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/x86bsd_m.asc">x86bsd_m.asc</A> <tab to=T><TD> 4461<BR><TD> L0pht Security Advisory (December 9, 1996)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/xenix.txt">xenix.txt</A> <tab to=T><TD> 4909<BR><TD> XENIX Commands and Information by Stingray
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/xwindows.txt">xwindows.txt</A> <tab to=T><TD> 13072<BR><TD> FAQ: A Crash Course in X Security
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="UNIX/zenixinf.hac">zenixinf.hac</A> <tab to=T><TD> 4967<BR><TD> XENIX COmmands and Information, by Stingray
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 79 files for a total of 3,311,861 bytes.</SMALL></TABLE></BODY>
</HTML>