THC Papers

The members of The Hacker's Choice have published a lot of technical papers covering nearly the full pallette of today's security. As a matter of fact some of the papers written in the mid and late 90s might appear a little bit dusty, but we believe you still may learn from them.

* Placing Backdoors Through Firewalls
Version: 1.0Date: 1999-05-03Language: englishSize: 18kb

Circumventing firewall systems by using reverse communication to protected systems.

* How to cover your tracks 1
Version: 1Date: 1996-12-24Language: englishSize: 44kb

Background and theory on how to cover your tracks while active in the internet.

* Practical SEH exploitation
Version: 1.0Date: 2004-02-18Language: englishSize: 922kb

Paper covering how to exploit the structured exception handler (SEH) on windows platforms including a step-by-step guide.

* 'Dusty' Stack Overflow Tutorial
Version: 1.0Date: 1996-12-24Language: englishSize: 30kb

Introduction to stack overflows and the creation of simple exploits.

* Writing Linux Kernel Keylogger
Version: 1.0Date: 2002-07-23Language: englishSize: 41kb

Phrack article discussing several methods for kernel-based keylogging on Linux systems.

* Anonymizing Unix Systems
Version: 1.0Date: 1999-10-07Language: englishSize: 35kb

Techniques to protect and anonymize sensitive data on Unix systems including concepts for filesystems, network traffic and system memory.

1-6 of 23 | next »

 
 

Search Papers

Select Language

* Select English
* Select German
* Select Both

  

Sort Order

* Sort by Date
* Sort by Downloads
* Sort by Title

 
 

 
 

Mailing List

The Hacker's Choice offers a public mailing list for announcements of new THC releases, papers and exploits. You can subscribe to the list by entering your email address in the field below.


Subscribe