The UNIX operating system has gone through many different and interesting incarnations since it was invented in the early 70's, but one thing is clear: It's a real fun system for a hacker to play with. Once you get past the initial halting steps of learning what you can do with it, UNIX provides many avenues of exploration, and many opportunities to get it to do things that the owners of the machine didn't expect you (as a user) to be able to do.
What's interesting about technical files like those below is that the authors will often give you a basic set of skills with UNIX before immediately delving into the arcana and weirdness necessary to do the trickery they're attempting. It must have made for a mighty odd way to learn about an operating system for a young person on a BBS. Maybe it was even the better way.
rm -rf .
Filename |
Size |
Description of the Textfile |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
admin2.txt 51966 | Improving the Security of Your Site by Breaking Into It, by Dan Farmer and Wietse Venema
| begin.txt | 85336 | UNIX For Beginners Second Edition, by Brian W. Kernighan
| berkly42.txt | 14848 | Understanding the UNIX Operating System (Berkeley 4.2) Patched Together by The War
| bestunix.hac | 7476 | My Favourite UNIX Commands, By ZeeBee Australia Inc. 1990
| betunix.txt | 9517 | Gaining Better Access On Any Unix System, by Doctor Dissector
| bhacking.txt | 5898 | A Beginner's Guide to Hacking UNIX by Jester Sluggo (October 8, 1985)
| bible.txt | 16109 | A Unix "Bible" (Actually a Glossary
| breinhar.txt | 37427 | White Paper on UNIX Security Issues, by Robert B. Reinhardt, November 11, 1992
| curry.txt | 140288 | Improving the Security of your UNIX System, by David A. Curry (April, 1990)
| dirfind.txt | 4242 | Newbie Tips: (Changing to / Hidden Directories) 1.1
| hack.txt | 10708 | Hacking Servers 101 by ChronicK of The E0D
| hack1 | 8753 | UNIX Odds and Ends: Keeping Users Off the System
| hack2 | 11957 | UNIX Trojan Horses
| hack3.hac | 7198 | The Basics of Hacking, by The Knights of Shadow (VAXs/UNIX)
| hacking_unix.txt | 41819 | An Indepth Guide to Hacking UNIX and the Concept of Basic Networking Utility by Red Knight of Phreakers/Hackers Undergound Network (June 10, 1989)
| hackunix | 7408 | How to Hack UNIX and VAX Systems by Thief and Wizard (1989)
| hackunix.txt | 41972 | An Indepth Guide in Hacking UNIX and the concept of Basic Networking Utility by Red Knight of Phreakers/Hackers Underground Network (June 10, 1989)
| hide.hac | 4486 | UNIX Abuse Collection, by ZeeBee Australia
| hss.txt | 6292 | Hacking Servers: A Beginner's Guide, by Lord Dredd
| interunx.txt | 355153 | UNIX For Intermediate users
| linux_mo.asc | 4634 | A Vulnerability in All known linux Distributions, by Bloodmask (August 13, 1996)
| maccrac.txt | 25503 | SOFTDOCS: Maccrac Version 0.1a by Ole Buzzard
| metaunix.hac | 5970 | A Beginner's Guide to Hacking Unix
| muh.hac | 6400 | A Beginner's Guide to Hacking UNIX By Jester Sluggo
| nfstricks.txt | 1944 | A List of NFS Tricks by Lord Pyro
| nis.txt | 1526 | NIS Explained by Virtual Circuit and Psychotic
| p500unix.txt | 34118 | A Flaw in the Berkeley 4.3 UNIX Passwd Program, with Code and History
| phelon1.txt | 9119 | PHELON #1: Some Information About Unix (For Beginners)
| ports.txt | 1559 | Some UNIX Ports and What to Do With Them
| secdoc.hac | 156965 | Improving the Security of your UNIX System, by David Curry
| securesu.txt | 29313 | How to Improve Security on a Newly Installed SunOS 4.1.3 System by Thomas M. Kroeger (July 1994)
| security.txt | 154698 | Improving the Securit of Your Unix System, by David A. Curry (April 1990)
| sendmail.fun | 2313 | A Little Sendmail Stuff, using the passwd file
| sirsunix.hac | 87805 | UNIX: A Hacking Tutorial, by Sir Hackalot
| sobunix.txt | 128483 | UNIX and Today's Hacker by Syncomm of (SOB 513)
| socket.txt | 3164 | The UNIX Socket Services
| stupid.unx | 10046 | Yet Even More Stupid Things to Do With Unix! by Shooting Snark
| sysadmin.txt | 14091 | Know your UNIX System Administrator
| troj.hac | 4790 | Basic Unix Use, by Lord Lawless
| uhacknfo.hac | 497325 | Security and the UNIX Operating System, 1990
| uhcom.txt | 23536 | A List of Some of the Most Useful UNIX Hacking Commands, and Some Hints on Their Usage
| unix-nas.txt | 5084 | UNIX Nasties by Shooting Shark (April 6, 1986)
| unix-tro.txt | 12412 | UNIX Trojan Horses by Shooting Shark of Tiburon Systems (June 26, 1986)
| unix.001 | 141735 | UNIX Use and Security from the Ground Up by The Prophet (December 5, 1986)
| unix.hal | 22197 | A Guide to UNIX Systems Part I by Hackers Against Law Enforcements (September 1, 1989)
| unix.inf | 14710 | UNIX Primer and Command Reference by Frosty of Mechwarriors
| unix.info | 4174 | Things to Know about UNIX, by Sir Charles Hansen
| unix.sec | 120683 | Improving the Security of your UNIX System, by David A. Curry (April, 1990)
| unix.txt | 6016 | The Fundamentals of UNIX Passwords, by Mr. Slippery
| unix.wek | 5248 | Unix Conversions (From DOS to UNIX) by David Johnson
| unix001.hac | 141523 | UNIX Use and Security from the Ground Up, by The Prophet
| unix001.txt | 138851 | UNIX Use and Security from the Ground Up, by The Prophet (December 5, 1986)
| unix1.hac | 9992 | Hackers Against Law Enforcement Present A Guide to UNIX Systems
| unix2.hac | 11624 | COSMOS, by Doctor Who
| unixacct.txt | 10995 | Creating UNIX Accounts by the Kryptic Night and the Servants of the Mushroom Cloud
| unixart.hac | 9099 | Mitch Wagner of UNIX Today on an interesting Hacking Case
| unixcall.txt | 2048 | Using UNIX to do an Outdial
| unixdos.fil | 3986 | UNIX Conversions (The Filing System) by David Johnson
| unixgrou.txt | 141649 | Unix Use and Security from the Ground Up by The Prophet (December 5, 1986)
| unixhak1.hac | 5498 | Tutorial on hacking through a UNIX system
| unixhak2.hac | 12384 | On the Security of UNIX
| unixhak3.hac | 3971 | Things to Know about UNIX by Sir Charles Hansen
| unixhck.hac | 5260 | UNIX Hacking Made Easy by Shadow Lord
| unixhell.txt | 13528 | Raising Hell with UNIX by the Kryptic Night
| unixhold.txt | 141525 | Unix Use and Security From The Ground Up by The Prophet (December 5, 1986)
| unixinfo.hac | 3072 | Unix System Basics by the Terminal Technician
| unixmyth.txt | 14012 | Is UNIX Really That Bad? The Myths of UNIX
| unixsec.txt | 28235 | Imporving the Security of your UNIX System by David Curry (April 1990)
| unixsir.hac | 86374 | UNIX: A Hacking Tutorial by Sir Hackalot
| unixsysv.hac | 11408 | Hacking UNIX System V
| unixsysv.txt | 11197 | How to Hack UNIX SYstem V (January 18, 1989)
| unixtips | 23535 | A List Of Some OF The Most Useful UNIX Hacking Commands, and Some Hints On Their Usage
| unixtroj.hac | 11958 | UNIX Trojan Horses (A List)
| unix~1.txt | 34534 | An Indepth Guide in Hacking UNIX and The Concept of Basic Networking Utility by Evil Ernie of No Lamers Allowed
| virpassw.txt | 3780 | The Passwords Used by the Internet Worm
| x86bsd_m.asc | 4461 | L0pht Security Advisory (December 9, 1996)
| xenix.txt | 4909 | XENIX Commands and Information by Stingray
| xwindows.txt | 13072 | FAQ: A Crash Course in X Security
| zenixinf.hac | 4967 | XENIX COmmands and Information, by Stingray
| |
There are 79 files for a total of 3,311,861 bytes. |