spacer
  • Nmap Security Scanner
    • Intro
    • Ref Guide
    • Install Guide
    • Download
    • Changelog
    • Book
    • Docs
  • Security Lists
    • Nmap Hackers
    • Nmap Dev
    • Bugtraq
    • Full Disclosure
    • Pen Test
    • Basics
    • More
  • Security Tools
    • Pass crackers
    • Sniffers
    • Vuln Scanners
    • Web scanners
    • Wireless
    • Exploitation
    • Packet crafters
    • More
  • Site News
  • Advertising
  • About/Contact
  • Sponsors:



Fyodor's Good Reading List

  • The Hacker Howto. This excellent essay by Eric Raymond (ESR) gives very insightful instruction on how to become a respected member of the hacker community.
  • The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption A great paper released 27 May 1997 by several of the biggest names in encryption and computer security, including Steven Bellovin, Matt Blaze, Whitfield Diffie, and John Gilmore. This describes exactly why we aren't going to let the government backdoor our crypto programs.
  • Smashing The Stack For Fun And Profit A great paper on buffer overflows by Aleph One. It is from Phrack49.
  • Mudge's tutorial on writing Buffer overflows. Another good paper.
  • IP hijacking paper A paper by Laurent Joncheray on the workings of IP hijacking.
  • The Hacker Crackdown A truly excellent book by Bruce Sterling about the early hackers. Mr. Sterling kindly (and much to the dismay of his publisher) decided to release the book freely over the internet.
  • Approaching Zero Another hacker book in electronic form. This one is about British phreaks.
  • Security Problems in the TCP/IP Protocol Suite An old but very interesting (and sadly, still applicable in many ways) paper by Steven Bellovin himself.
  • Them and Us:Chapter 6 of Paul Taylor's hacker book (basically publishing his dissertation)
  • cifs.txt *Hobbit*'s excellent CIFS insecurities paper.
  • Hacker Encyclopedia This is a huge compendium of hacker/computer/science fiction information written by Logic Bomb. It is not word wrapped, so you will probably want to read it with vi or emacs rather than netscape
  • Tamperproof Smart Cards This is a very interesting paper by Ross J. Anderson <ross.anderson@cl.cam.ac.uk> It brings up a number of very interesting issues about defeating smart card security.
  • Murphy's Law and Computer Security A paper by Wietse Venema which details many often overlooked aspects of computer security and program bugs. This paper is loaded with examples.
  • Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection A classic apper by Thomas Ptacek and Timothy Newsham on techniques for evading Intrusion Detection Systems. This was written in '98, but much of it still rings true in '01 :( . [PDF version]

Lighter Reading / Misc

  • What makes UNIX users so smart? An excellent essay on the relationship between literature and the powerful, flexible command-line interface to UNIX.
  • Richard Stallman's excellent essay on the right to read. It is short and insightful. Take 2 minutes and read it!
  • "The hollowing out of ourselves" an excellent essay by Stephen Talbott about the pathetic lack of real content on the web today and the pointlessness of embracing new technology for its own sake, rather than to achieve any actual ends.
  • "Why Cryptography is Harder Than it Looks" an essay by Bruce Schneier describing the many problems unique to developing cryptosystems. It really is more interesting than it sounds.
  • Concerning Hackers Who Break into Computer Systems by Dorothy E. Denning This is a somewhat dry, but rather interesting paper by someone best known for siding with the spooks and favoring export controls on cryptography. She interviewed many hackers and it is interesting to see things through her eyes.
  • UNIX Wars A hilarious spoof on star wars involving the fight between common users and fascist administrators who seek to destroy all productivity.
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.