THC Papers

The members of The Hacker's Choice have published a lot of technical papers covering nearly the full pallette of today's security. As a matter of fact some of the papers written in the mid and late 90s might appear a little bit dusty, but we believe you still may learn from them.

* 'Dusty' Stack Overflow Tutorial
Version: 1.0Date: 1996-12-24Language: englishSize: 30kb

Introduction to stack overflows and the creation of simple exploits.

* 0130 Scanning
Version: 1.0Date: 1997-05-18Language: germanSize: 31kb

Einführung in die Analyse von Telefonsystemen und Identifikation von Diensten, wie z.B. VMB, PBX und Carriers. Beispiele werden an der Application THC-Scan illustriert.

* A selective switch for getting more comfortable scanning
Version: 1.0Date: 1996-06-01Language: englishSize: 5kb

Building a hardware device for more comfortable blueboxing and scanning.

* Anonymizing Unix Systems
Version: 1.0Date: 1999-10-07Language: englishSize: 35kb

Techniques to protect and anonymize sensitive data on Unix systems including concepts for filesystems, network traffic and system memory.

* Attacking FreeBSD with Kernel Modules
Version: 1.0Date: 1999-07-01Language: englishSize: 143kb

Backdooring the FreeBSD kernel with loadable kernel modules. This article is an extension of the previous article focusing on Linux LKMs.

* Attacking Solaris with Loadable Kernel Modules
Version: 1.0Date: 1999-12-20Language: englishSize: 55kb

Implementing kernel-based hiding and backdoors using Solaris loadable kernel module.

1-6 of 33 | next »

 
 

Search Papers

Select Language

* Select English
* Select German
* Select Both

  

Sort Order

* Sort by Date
* Sort by Downloads
* Sort by Title

 
 

 
 

Mailing List

The Hacker's Choice offers a public mailing list for announcements of new THC releases, papers and exploits. You can subscribe to the list by entering your email address in the field below.


Subscribe