PHRACK articles. Many of the articles contained here from various issues of PHRACK magazine off the net contain information on system internals, how to add intercepts, how to detect them, and so on. Some of them present this material in a context of "how to break in and hide your actions", but it is vital to understand where such attacks can be and what their technical level is. Some of the detection technology is also useful directly in defeating such intrusion. Files: AAAREADME.TXT;1 ARREST.TXT;1 BYPASS-HOST-IDS.TXT;2 CCS7.TXT;1 CGI-HOLES.TXT;1 CRIM.TXT;1 DCERT.TXT;1 DEFEAT-IDS.TXT;1 DEFEATSNIFFERS.TXT;1 DTMF.TXT;1 EARLY-OS-DESIGN.TXT;1 ETERNITY-DATASTORE.TXT;1 EXTRACT.C;2 FILE-DESC-HIJ.TXT;1 FILEDES-HIJ.TXT;1 FORTH-HACK.TXT;1 FWTUNNEL.TXT;2 HARD-BSD.TXT;1 HIDE-PROMISC.TXT;1 IP-ROUTE.TXT;1 IP-SPOOF.TXT;1 JUGGERNAUT-12-PATCH.TXT;2 JUGGERNAUT10.TXT;2 KEYTRAP.TXT;1 LINUXDVR.TXT;1 LINUXHARD.TXT;1 LNX-TT-HIJ.TXT;2 LOKI1.TXT;1 LOKI2.TXT;2 MERIDIAN-VOICEMAIL.TXT;1 MONOALPHABET-CRYPTANALY.TXT;1 NT-INTER-PROBE.TXT;2 NT-NETMON.TXT;1 NT-PWD-CRK.TXT;1 NTWEBVUL.TXT;1 P51NEWS.TXT;1 P52NEWS.TXT;1 P53NEWS.TXT;1 P54N4.PHTML;1 P54N5.TXT;1 P54NEWS.TXT;1 PC-APP-SEC.TXT;1 PHN-DIVERTER.TXT;1 PHRACKV2-INDEX.TXT;1 PHREAKM.TXT;1 PINGD.TXT;1 PPTP-VUL.TXT;2 PPV-NOT.TXT;1 REM-OS-DET.TXT;1 RPCSCAN.TXT;2 SCANDET.TXT;2 SCANNING.TXT;1 SCAVCONN.TXT;2 SHARED-LIB-REDIRECTION.TXT;1 SHR-LIB-RED.TXT;1 SKYTEL.TXT;1 SLC.TXT;1 SMASHSTACK.TXT;1 SNMP-VUL.TXT;1 STEG.TXT;1 STEGO-SIGNS.TXT;1 SYNFLOOD.TXT;1 T-TCP-VUL.TXT;1 TCP-WEAKNESS.TXT;1 TRUSTED-PATH-EXEC-REDUX.TXT;1 VRU.TXT;1 WATCHER-NID.TXT;2 WEAKLINUX.TXT;1 WIN-KEYLOG.TXT;2