THC Papers

The members of The Hacker's Choice have published a lot of technical papers covering nearly the full pallette of today's security. As a matter of fact some of the papers written in the mid and late 90s might appear a little bit dusty, but we believe you still may learn from them.

* Placing Backdoors Through Firewalls
Version: 1.0Date: 1999-05-03Language: englishSize: 18kb

Circumventing firewall systems by using reverse communication to protected systems.

* Human 2 Hacker
Version: 1.1Date: 1999-01-03Language: germanSize: 124kb

Grundsätzliche Techniken für den Einstieg in die "praktische" IT-Sicherheit. Das "Hacker-Werden" bleibt dem geneigten Leser als Übung überlassen.

* How to cover your tracks 1
Version: 1Date: 1996-12-24Language: englishSize: 44kb

Background and theory on how to cover your tracks while active in the internet.

* Practical SEH exploitation
Version: 1.0Date: 2004-02-18Language: englishSize: 922kb

Paper covering how to exploit the structured exception handler (SEH) on windows platforms including a step-by-step guide.

* 'Dusty' Stack Overflow Tutorial
Version: 1.0Date: 1996-12-24Language: englishSize: 30kb

Introduction to stack overflows and the creation of simple exploits.

* Writing Linux Kernel Keylogger
Version: 1.0Date: 2002-07-23Language: englishSize: 41kb

Phrack article discussing several methods for kernel-based keylogging on Linux systems.

1-6 of 33 | next »

 
 

Search Papers

Select Language

* Select English
* Select German
* Select Both

  

Sort Order

* Sort by Date
* Sort by Downloads
* Sort by Title

 
 

 
 

Mailing List

The Hacker's Choice offers a public mailing list for announcements of new THC releases, papers and exploits. You can subscribe to the list by entering your email address in the field below.


Subscribe