|
+
Hacking Stuff + |
[
+
Ðëpëñdïñg öñ whömë ÿöü ä§k, hä©k뮧 ä®ë hä®ml맧 p®äñk§t뮧, ©ü®ïöü§
të©hïë§, ñößël f®ëëdöm fïghtë® ö® däñgë®öü§lÿ üñp®ëdï©täßlë ©ÿßë®-të®®ö®ï§t§.
ħ thë wö®ld göë§ öñlïñë, hä©k뮧' pötëñtïäl ïñflüëñce -äñd mëñä©ë-g®öw§.+] |
+ Cool
Links + |
|
|
|
|
+
Cracking Software + |
+
Hackers. COM + |
|
|
|
+ 2600.com
+ |
|
|
Definition of HACKING :
Gaining unauthorized access to a particular security system is called as
hacking. Literally hacking means cutting down and conventionally it means
breakdown. Cutting down and break down of a certain security system to get
required information. Here information means manipulated data that is
useful to run a security system. |
+
Altalavista + |
|
|
+
Hacked + |
|
|
+
virus + |
|
|
+
Sub7 + |
|
|
+ BugMafia + |
|
|
+
Hacking + |
+
Euyulio + |
|
|
+
Underground + |
|
+
hackzone + |
|
|
+
hope + |
|
Breaking out of restricted
Win95 Environments by BioMenace |
|
|
Explanation of the MSIE 3.0
bug by Goat |
|
Hacking Webpages by Goat |
Turning your Mail Bomber
into a ICQ Pager Bomber by Sandman |
The Ultimate Guide Passwd
Files by Goat |
|
Exploiting Net
Administration Cgi's like nethosting.com |
IRC-Social Engineering by
Optik Lenz |
Hacking Servers 101 by
ChronicK |
|
How to Get a *Good* Shell
Account Part 2 |
How to Get a *Good* Shell
Account Part 1 |
Guide To (mostly) Harmless
Hacking ; Linux |
How to nuke offensive Web
sites |
How get email spammers
kicked off their ISPs |
Good Background on hacking
Part 1 |
Good Background on hacking
Part 2 |
Have a shell in 24hours
after reading this |
TCP Port Stealth Scanning |
The Hotmail Hack by Digital |
Getting URLs through Telnet
by PLahZma |
Tracing an e-mail message |
Guide to mostly harmless
hacking |
List of Anonyomous E-mail
Servers |
Simple Active Attack Against
TCP |
Get into someone else work
space in Win95 by Sub-Atomic |
+
Cracking + |
Introduction to Win95
Cracking |
How To Disassemble A Windows
Program(part 1) |
How To Disassemble A Windows
Program(part 2) |
Odin's Cracking Tutorial |
Qapla's cracking tutorial,
version 0.1 rel 970209 |
raZZia's Tutorial on Key
Generators (01-97) |
|
razzia's tutorial for vb
cracking |
How to undongle by +Xoanon |
The flags-faking approach |
TimeLOCK DLL "a cracking
approach" |
Softice CHAPTER 1 -
Introduction |
Softice CHAPTER 2 - Getting
Started |
Softice CHAPTER 3 -
Debugging In 30 Minutes |
Softice CHAPTER 4 - Using
Break Point Commands |
Softice CHAPTER 5 - Using
Other Commands |
Softice CHAPTER 6 - Soft-ICE
Initialization Options |
Softice CHAPTER 7 - Symbolic
and Source Level Debugging |
Softice CHAPTER 8 - Expanded
Memory Support |
Softice CHAPTER 9 - Back
Trace Ranges |
Softice CHAPTER 10 - Using
Soft-ICE with MagicCV or MagicCVW |
Softice CHAPTER 11 -
Advanced Features |
SoftICE Tutorial |
Using Breakpoints |
+
Phreaking + |
Get ca$h, from the fon
company free by ChronicK |
How to build and operate my
DeLier Box by PsycðPyrð |
A Newbies guide to Phreaking
in the 90's |
What do all the colored
boxes do? |
What is an ANAC number? |
What is a Black Box? |
What is a Blue Box? |
What is Caller-ID? |
What is a CNA number? |
|
What are the DTMF
frequencies? |
|
What are all of the * (LASS)
codes? Example: *70 |
What is a loop? |
What is a PBX? |
What is a Red Box? |
What is a ringback number? |
What is scanning? |
What is a VMB? |