Archive | Old Skool Philes


21 April 2010 | 36,664 views

The Conscience of a Hacker AKA The Hacker’s Manifesto By The Mentor

This is a seminal piece of writing from the underground, forgotten by many but adored by many more. It still resonates with me and has as much meaning as it did back in the day when I first read it in Phrack Issue 7. If you don’t know anything about this text or have never [...]

Continue Reading


25 March 2008 | 19,376 views

Hacking Windows NT Through IIS & FTP

This is another selection from the Old Skool Philes, I like these as they tend to generate some good discussion and they are a good introduction to newcomers to hacking on the mindset and workflow of getting access to a box. The exact methods may not work, but we aren’t here to train script kiddies, [...]

Continue Reading


02 December 2006 | 17,264 views

Writing Worms for Fun or Profit

0x00: Preface Media, kindly supported by AV “experts”, drawn apocalyptical vison of desctruction caused by stupid M$ Outlook / VisualBasic worm, called “ILOVEYOU”. Absurdal estimations – $10M lost for “defending the disease”, especially when you take a look at increasing with the speed of light value of AV companies market shares, made many people sick. [...]

Continue Reading


04 September 2006 | 308,047 views

Web Based E-mail (Hotmail Yahoo Gmail) Hack/Hacking with JavaScript

“pleez, pleez, PLEEZ teach me how to hack a Hotmail Account!!!” -unidentified IRC user From here on in you walk alone. Neither little_v OR Black Sun Research Facility AND its members will be responsible for what you do with the information presented here. Do not use this information to impress your “l33t0_b0rit0″ friends. Do not [...]

Continue Reading


01 September 2006 | 225,722 views

Remote Network Penetration via NetBios Hack/Hacking

These are basic techniques but very useful when penetration testing any Windows based network, the techniques were discovered on WinNT but are still very valid on Windows2000 and in some cases Windows2003 due to backwards compatibility. This article is being written in a procedural manner. I have approached it much like an intruder would actually [...]

Continue Reading


30 August 2006 | 172,881 views

How to get Ops and takeover a channel on IRC Hack Hacking

I’ve been spending a lot of time online lately reading all kinds of stupid text files on how to “Takeover Ops Boi!!!”, “eLeEt WaYs To gEt OpS!!!”, “HOW TO GET OPS ON SERVER SPLITS”, etc. We all know none of these things work, at least not for me. They’re either written by morons, or they [...]

Continue Reading


25 August 2006 | 120,869 views

Anonymous Connections Over the Internet – Using Socks Chains Proxy Proxies

Introduction This tutorial is an attempt to help you re-route all internet winsock applications in ms windows trough a socks chain, thus making your connections much more anonymous. Theory The more different hops you make your data jump, the more difficult it will be to trace it back. take this route for example: you –> [...]

Continue Reading