THC Papers

The members of The Hacker's Choice have published a lot of technical papers covering nearly the full pallette of today's security. As a matter of fact some of the papers written in the mid and late 90s might appear a little bit dusty, but we believe you still may learn from them.

* 'Dusty' Stack Overflow Tutorial
Version: 1.0Date: 1996-12-24Language: englishSize: 30kb

Introduction to stack overflows and the creation of simple exploits.

* A selective switch for getting more comfortable scanning
Version: 1.0Date: 1996-06-01Language: englishSize: 5kb

Building a hardware device for more comfortable blueboxing and scanning.

* Anonymizing Unix Systems
Version: 1.0Date: 1999-10-07Language: englishSize: 35kb

Techniques to protect and anonymize sensitive data on Unix systems including concepts for filesystems, network traffic and system memory.

* Attacking FreeBSD with Kernel Modules
Version: 1.0Date: 1999-07-01Language: englishSize: 143kb

Backdooring the FreeBSD kernel with loadable kernel modules. This article is an extension of the previous article focusing on Linux LKMs.

* Attacking Solaris with Loadable Kernel Modules
Version: 1.0Date: 1999-12-20Language: englishSize: 55kb

Implementing kernel-based hiding and backdoors using Solaris loadable kernel module.

* Attacking the IPv6 Protocol Suite
Version: 1.0Date: 2006-10-31Language: EnglishSize: 373kb

Talk presenting inherent protocol weaknesses of IPv6 and ICMP6. Beside a short introducing to IPv6, it covers techniques for scanning, redirection, DoS, man-in-the-middle and a lot more under IPv6.

1-6 of 23 | next »


Search Papers

Select Language

* Select English
* Select German
* Select Both


Sort Order

* Sort by Date
* Sort by Downloads
* Sort by Title



Mailing List

The Hacker's Choice offers a public mailing list for announcements of new THC releases, papers and exploits. You can subscribe to the list by entering your email address in the field below.