White Papers

# Title Document
46 Guide to IIS Exploitation  IIS_Exploitation.txt
47 Finger a user via telnet  finger.txt
48 How To Become A Hacker  hacker-howto.html
49 The Hacker's RFC  hackers-rfc.txt
50 The Hack FAQ  hackfaq.zip
51 Hacking Kit v2.0  hackkit-2.0b.txt
52 Hacking Webpages The Ultimate Guide  hackpage.txt
53 How to crack a unix password file  hackpw.txt
54 Host Fingerprinting and Firewalking With hping  HostFingerprinting.pdf
55 How to detect Honeypots using hping  Honeywalldetection.pdf
56 Advanced Host Detection Techniques  host-detection.doc
57 How to Bypass BIOS Passwords  Bypass_BIOS.txt
58 How To Find Ftp's The Easy Way  find-ftps.txt
59 How to modify exe files  modify_exe.txt
60 Introduction to HTTP fingerprinting  httprint_paper.zip
61 Unicode exploitation with how it works  UnicodeExpl.doc
62 The Info-Gathering Tutorial  Info-Gathering.txt
63 Integer array overflows  int-arr-overfl.txt
64 A Network Intrusion Detector  intv2-8.pdf
65 An IP address FAQ  ip-faq.htm
66 Simple Active Attack Against TCP  tcp-attack.txt
67 IP-spoofing Demystified  ipspoofing_dem.zip
68 A Guide to Internet Security  inetsec.txt
69 A short overview of IP spoofing  ip-spoof.txt
70 Anonymous FTP FAQ  anon-ftp-faq.htm
71 Network Packet Capture FAQ  pack_cap.htm
72 How javascript can be used to bypass html forms  javascript_fun.txt
73 John The Ripper - An Illustrated Guide  John_The_Ripper.pdf
74 Learning Perl Writing Exploits  Learning_Perl.pdf
75 Learn Information Gathering By Example  Info_Gather.pdf
76 Looking for Vulnerabilities  vuln_look.txt
77 The Linux Kernel HOWTO  linux-kernel.txt
78 Linux Shell Coding Reference  linux-shell-ref.pdf
79 Locating Stateless Firewalls  firewalls-loc.txt
80 "Cloning MAC Addresses" Whitepaper  mac_addr_clon.pdf
81 Metasploit 3.0 Automated Exploitation  metasploit_expl.txt
82 DNS Spoofing and Abuse  dns_spoof.htm
83 Paper explaining man-in-the-middle attacks  MiddleMan.pdf
84 Misc Linux Tips & Tricks  linux_tips.txt
85 Mobile Secret Codes  secret_codes.txt
86 Feed Injection in Web 2.0  HackingFeeds.pdf