A general note on the term "Hacking." The nomenclature in the Information
Technology field is mixed when one speaks about computer attacks and other
malicious computer activity. Some schools of thought refer to malicious computer behaviour
as "hacking" and others refer to it as "cracking." Terms such as white-hat and
black-hat are also used. Malicious users are normally labeled as black-hats,
and computer security professionals are normally labeled as white-hats. Regarding hacker
versus cracker, I prefer to use hacker as an equivalent to white-hat and cracker
as an equivalent to black-hat. Therefore, I consider myself to be a HACKER.
In order to be an expert in the art of hacking and defending against malicious
activity, one must understand the behaviour of the opponent. One can't
defeat his opponents without practice and knowledge of the game. This is
where the principle of security via obscurity becomes a bit blurry. To this end,
I justify publishing the information below. The links provided below are
intended to only be used for white-hat security research purposes.
There is a Russian Proverb that is used by security experts:
"TRUST, BUT VERIFY". Some of the links below will point you to code
that can be used in very malicious ways (DoS, gaining remote and/or local root access,
worms, viruses, etc). So, "HACK, BUT DON'T CRACK"
when you use these links!
- Internet Assigned Numbers Authority (IANA)
- Internet Engineering Task Force (IETF)
- Computer Worms
- Computer Virus
- The Linux Documentation Project
- The National Vulnerability Database
- Free SWAN--Secure Wide Area Networking software
- Samba Exploit--Exploit to crack into a server running an unpatched version of Samba
- Code from the book: "Hacking-The Art of Exploitation"
- The NetCat Project--A useful networking tool
- The Original Netcat tool
- Using Netcat as a quick and dirty client-server application
- Intel 64 and IA-32 Basic Architecture (From www.intel.com)
- Intel Instruction Set-A-M
- Intel Instruction Set-N-Z
- Intel Systems Programming-Volume 3a
- Intel Systems Programming-Volume 3b
- Intel Systems Optimization
- NASM--The Netwide Assembler
- Which ENDIAN do you prefer?