Phrack 32-3 - Concerning Hackers Who Break into Computer Systems
From the author's abstract -
A diffuse group of people, often called ``hackers,'' has been characterized as unethical, irresponsible, and a serious danger to society for actions related to breaking into computer systems. This paper attempts to construct a picture of hackers, their concerns, and the discourse in which hacking takes place. My initial findings suggest that hackers are learners and explorers who want to help rather than cause damage, and who often have very high standards of behavior. My findings also suggest that the discourse surrounding hacking belongs at the very least to the gray areas between larger conflicts that we are experiencing at every level of society and business in an information age where many are not computer literate. These conflicts are between the idea that information cannot be owned and the idea that it can, and between law enforcement and the First and Fourth Amendments. Hackers have raised serious issues about values and practices in an information society. Based on my findings, I recommend that we work closely with hackers, and suggest several actions that might be taken.

Phrack 22-7 - Computer Hackers Follow A Guttman-Like Progression
This 1988 article by Richard C. Hollinger of the University of Florida discusses some research into the most common actions of hackers, referencing several articles on the topic from the 80s.

Phrack 43-14 - Playing Hide and Seek, Unix Style
[Note: Starting with issue 42, Phrack began to include a copyright statement and requirement that "Corporate/Institutional/Government" readers negotiate a subscription. See their home page]

This paper provides information on altering syslog files, clearing out utmp and wtmp and process accounting files, and bypassing tripwire file modification checks (or so I've heard).

Phrack 50-8 - Cracking NT Passwords
Like the title says, plus comes with source code!

Phrack 25-5 - Unix Cracking Tips
This article, written in 1989, includes some rather clever hacks. In a very understated paragraph, it also points out a fundamental problem with Internet utilities from day 1 -- passwords travelling the network in readable form -- that has been one of the largest sources of problems this year. That was 8 years ago!

Phrack 22-4 - A Novice's Guide to Hacking- 1989 edition
An introductory guide for beginning hackers, explaining the guidelines of the hacker ethic and giving some references on hackers and hacking. Includes a list of common passwords, optimized for cracking with those slooooowwww CPUs they had back in the 80s (would probably still get into a few accounts today... will users never learn good password security practices?)

Phrack 18-6 - Unix for the Moderate
I think he meant "intermediate" (are hackers ever "moderate"?). Some basics of finding ways to get root, covering your tracks, and setting up backdoors to keep root.

Phrack 18-7 - Unix System Security Issues
A contribution from Holland, this paper explains file permissions, a basic trojan horse password-stealer, and gives some references to other security related articles and books.

Phrack 25-6 - HIDING OUT UNDER UNIX
An old (1989) article on correlating interactive processes with what shows up in the output of who.


Last modified: Wed Dec 10 13:44:29 1997