Skip to main content

Articles

A Guide To A New Generation Of Phreaking (Part 2)

posted onNovember 1, 2004
by hitbsecnews

By: decimalz

Welcome to part 2 in my series on phreaking.
This issue we will look at the Old & Ancient art of war dialing,
More Mobile Fun, Australian Dial up Points of access
And some interesting truths about telstra field technicians.

"...carrying human voice over copper wires is impossible, and even if
it was possible, the thing would have no practical use."
-From a newspaper editorial in the 1870's

Baselining with Microsoft Security Templates

posted onNovember 1, 2004
by hitbsecnews

Note: This article first appeared over at our affiliates site WindowSecurity. The original article can be viewed here

By: WindowSecurity Staff

The solution to creating and implementing security baselines on computers in your network is to “just do it.” Security baselines establish the foundation for the overall security of a computer. If a computer has no foundation, the chances of it being compromised are very high.

Guide to ARP Spoofing

posted onApril 6, 2004
by hitbsecnews

L33tdawg: This article first appeared over at our affiliates' site Underground Mac. The original article can be found here.

By: Barfbag

ARP spoofing is an effective way to intercept, sniff, hijack and DoS connections. It is a more effective way of hijacking sessions, because it allows attackers to see incoming and outgoing communications, as if they were a proxy, as opposed to "blind" TCP/IP spoofing.

Background on ARP

Hiding Files

posted onApril 6, 2004
by hitbsecnews

L33tdawg: This article first appeared over at our affiliates site Underground Mac. The original article can be found here.

By: [in]visible

I'm writing this assuming you know the basics of using Terminal.
This paper is for those who have nosey brothers, sisters, parents and or if you can't trust what your friend is going to do on your computer when you go to use the restroom.

Virtual File System - /proc

posted onApril 6, 2004
by hitbsecnews

L33tdawg: This article first appeared over at our affiliates' site EBCVG. The original article can be found here.

By: Danny "Dr. T"

This article gives a brief overview on the /proc file system. It explains how to gather information using /proc and how to change system information (shortly explained). The article mostly focuses on important parts of /proc and less on others. Even though it is a short article, it provides good information for any UNIX-based operating system user.

Simplenews subscription

Stay informed - subscribe to our newsletter.
The subscriber's email address.
Keeping Knowledge Free for Over a Decade

Copyright © 2018 Hack In The Box. All rights reserved.

36th Floor, Menara Maxis, Kuala Lumpur City Centre 50088 Kuala Lumpur Malaysia
Tel: +603-2615-7299 Fax: +603-2615-0088