Hacking

  1. 3 cyber mercenaries: An insider threat case study

    Article This article tells the story of three US nationals who assisted the United Arab Emirates in exploiting Apple's operating system and...

  2. Advanced Network Reconnaissance with Nmap

    Video This video is a presentation by Gordoon Lyon aka Fydor, the creator of the nmap network scanner, from ShmooCon 2006. From...

  3. After Modernity: Archaeological Approaches to the Contemporary Past

    Book The introduction to this book provides access to the debate on the "archeology of the contemporary" or, in other terms, the archeology of...

  4. An Evening with Berferd: In Which a Cracker is Lured, Endured, and Studied

    Article This article is written by Bell Labs researcher Bill Cheswick about Unix security. Cheswick studied a hacker in the wild using an early...

  5. An Oral History of the L0pht

    Article This series of articles is an oral history of one of the more influential hacker groups, the Boston-based hacker group,...

  6. A Novice's Guide to Hacking- 1989 edition

    Article This article is a classic piece of self-directed training in hacking by a hacker with the handle The Mentor from the...

  7. Apple I

    Digital Artifact This article details the technical development and contextual history of the Apple I, originally released under the name Apple Computer. This...

  8. A Prehistory of Social Media

    Article This article provides an introduction to the birth of social media by providing a "prehistory" of the internet itself. The article focuses...

  9. Archaeology of Hacking: Textfiles Explainer

    Video This video an overview of the hacker underground media sharing platform known as textfiles. 

  10. Are Hacker Break-Ins Ethical?

    Article From the article description: Eugene H. Spafford argues that we should judge the actions of hackers, not the rationalizations they...

  11. A Vulnerable Internet Lecture Slides

    Lecture / slides Slides for Lecture 24 of Ethical and Professional Issues in Notre Dame's Computer Science and Engineering department. The learning goals for...

  12. Back Orifice

    Digital Artifact This article details the digital artifact Back Orifice (a play on Windows Back Office) created by the hacking group Cult of the...

  13. BBS The Documentary: Episode 1 of 8: BAUD (The Beginning)

    Video This video is episode 1 of 8 of a documentary mini-series by Jason Scott about the bulletin board systems (BBS). From...

  14. Book Launch: The Hacker and the State

    Video This video is the book launch of Dr. Ben Buchanan's book The Hacker and the State. From the video description, "Packed with...

  15. Buffer Overflow Exploit

    Digital Artifact This article describes the digital artifact of a buffer overflow exploit. A buffer overflow is an anomaly where a program writes...

  16. Capital One Data Breach Compromises Data of Over 100 Million

    Article This article sheds light on a 2019 data breach of data from Capital One bank. The article explains how the suspect,...

  17. Change the World, cDc Style

    Video This video is from the DefCon 27 Conference and is a presentation by the hacking group Cult of the Dead Cow. This...

  18. Coding Freedom: The Ethics and Aesthetics of Hacking

    Book This book was written by scholar Gabriella Coleman about the ethics and history of the hacking community. The particular chapter read...

  19. CONFidence 2021: The Coming AI Hackers

    Video This video is from CONfidence 2021 from Bruce Schneier discussing the future of hacking. From the video description, "Hacking is a human endeavor,...

  20. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

    Book This book describes the details of the history and technological development of the Stuxnet Worm. Kim Zetter is a top cybersecurity journalist...

  21. Credit reporting firm Equifax says data breach could potentially affect 143 million US consumers

    Article This article describes a 2017 data breach affecting Equifax, a company providing credit information. The breach potentially affected 143 million consumers...

  22. Crypto

    Book Chapter This book chapter is from Steven Levy's book "Crypto" which tells the stories of key figures behind cryptography and the cypherpunk movement. This...

  23. Cult of the Dead Cow

    Book Chapter This book chapter from the recent book on the hacking group the Cult of the Dead Cow is about the Back Orifice...

  24. Darknet Diaries Ep: 45 Xbox Underground

    Video This video details one of the biggest hacks on the Xbox gaming console. From the video description, "It started as a...

  25. DEFCON - The Full Documentary

    Video This video is a documentary of the DefCon hacker conference and hacking convention. From the video description, "A film about the world's...

  26. Dialogue Group 11

    Dialogue Group This dialogue group meeting prompt was used in the Ethical and Professional Issues Course in Notre Dame's Computer Science and...

  27. Exploding the Phone

    Book This book provides an in-depth historical perspective and study of phone phreaking and hackers of the telecommunication industry known as phone...

  28. Freedom Downtime

    Video This video is the documentary from 2001 that is sympathetic to convicted computer hacker, Kevin Mitnick. It is produced by 2600...

  29. From Internet Farming to Weapons of the Geek

    Article This article details the history of political hacking by Gabriella Coleman in which she provides an introduction and inventory of the...

  30. GNU General Public License, v.2

    Digital Artifact This digital artifact is a well known legal hack also known as a "copyleft" (a play on copyrights). The GNU Public License,...

  31. Group claims to hack NSA-tied hackers, posts exploits as proof

    Article This article tells the story of a hacking group called the Shadow Brokers that claimed to have hacked the NSA's hacking...

  32. H2K2: The Conscience of a Hacker

    Video This video is of the hacker who goes by the handle The Mentor reading his famous essay from 1986, titled "The...

  33. Hacker Activism of the Guacamaya

    Video This video is by the international environmental hacking group known as the Guacamaya. The group has published anonymous reports and leaked sensitive files...

  34. Hacker Crackdown: Law and Disorder on the Electronic Frontier

    Book Chapter This book details the spirit of the times with the criminalization (and eventual crackdown) of the so-called "hacker underground." This particular...

  35. Hacker Documentary: Unauthorized Access by Annaliza Savage [1994]

    Video This video has the following YouTube description: This is a nostalgic hacker documentary about the early to mid 90s computer...

  36. Hackers: Heroes of the Computer Revolution

    Book Steven Levy's book is is a classic text on the history of computing. It is used throughout the course to highlight the hacker...

  37. Hacker Space Design Patterns

    Lecture / slides This document is a set of slides from Jens Ohlig and Lars Weiler for the 24th Chaos Communication Congress about Building a...

  38. Hackers Testimony at the United States Senate

    Video This video depicts the testimony of the hacker group, L0pht Heavy Industries, in front of the United States Senate in 1998. The...

  39. Hackers - Wizards of the Electronic Age

    Video This video is a short documentary about the hacker underground and the foundations of the hacker ethic. From the video description,...

  40. Hacking at the Crossroad: U.S. Military Funding of Hackerspaces

    Article This article is an influential piece written by the inventor Mitch Altman about the influence of defense funding in technological development. It...

  41. Hacking Security

    Article In this article, the authors argue that today's security issues are not information security threats, but rather "abuse." Abuse is...

  42. History of Gnu, Linux, Free and Open Software

    Video This video depicts the history of the open source and free software movements including the history and technological development of Gnu and...

  43. Introducing the LAN Turtle

    Video This video is an introduction to the LAN Turtle by Hak5 an infosec company founded in 2005. From the video description, "The LAN...

  44. Inventing Copyleft

    Article This book chapter is from Christopher Kelty's book called "Two Bits: The Cultural Significance of Free Software" that details the history of Free...

  45. Linux Operating System

    Digital Artifact This article describes the digital artifact of the Linux Operating System which is a family of open-source Unix-like operating systems based on...

  46. Low Orbit Ion Cannon

    Digital Artifact This article describes the digital artifact Low Orbit Ion Cannon which was originally created by Praetox Technologies. The Low Orbit Ion Cannon...

  47. Masters of Crowds: The Rise of Mass Social Engineering

    Article This article provides a deep history of mass manipulation from the 1920s through the mid-1970s. This article is adapted from the...

  48. Metasploit Framework

    Digital Artifact This article details the digital artifact the Metasploit Framework or the Metasploit Project. This artifact is a computer security project that...

  49. Nessus Proprietary Security Scanner.

    Digital Artifact This technology is a digital artifact by Tenable which is the Nessus Properitary Security Scanner. This technology is properitary software from...

  50. Network Mapper (nmap)

    Digital Artifact This article presents the Network Mapper (nmap) tool created by Gordon Lyon who is also known by the psuedonym Fyodor Vaskovich. This tool...

  51. .nfo File

    Digital Artifact This article describes a digital artifact known as the .nfo file extension which is a shortening of info or information. This...

  52. Operation Sundevil

    Video The video provides a brief overview of Operation Sundevil from the 1990s. The operation was apart of a large hacker crackdown...

  53. Phone Phreaking: A Call From Joybubbles

    Video This video depicts a phone phreaking call made by the hacker Joybubbles aka Josef Engressia, Jr. This original sound byte comes...

  54. Phrack Magazine - Issue 31

    Article This article is an introduction to Issue 31 of the popular underground hacking publication of Phrack Magazine. This particular article details...

  55. Ransomware attacks are getting more complex and even harder to prevent

    Article This article discusses the threat of ransomware attacks. Ransomware attackers are launching attacks faster than vendors can patch the vulnerabilities, and...

  56. Reading Quiz 12

    Reading Quiz This reading quiz was used in the Ethical and Professional Issues course in the Computer Science and Engineering department at Notre...

  57. Red Box (Phreaking)

    Article This article provides a technical description and history of the red box phone phreaking device. This device was created and utilized...

  58. Reflections on Trusting Trust

    Article This article is a written version of an Alan Turing Award Lecture from Ken Thomson in 1984. This article is a...

  59. Remote OS detection via TCP/IP Stack FingerPrinting

    Article This article is from issuse 54 of Phrack Magazine in 1998 written by Gordon Lyon aka Fydor, the creator of the...

  60. Rene Carmille

    Article This article details the life of Rene Carmille who is known to be one of the first hackers. This article gives a...

  61. Representing Hacker Culture: Reading Phrack

    Book Chapter This book chapter from Douglas Thomas' book Hacker Culture details an outsider's guide to reading the hacker zine Phrack. This chapter discusses...

  62. Resistance to the current: the dialectics of hacking

    Book Chapter This book chapter is titled "Internet Relay Chat: A Time Machine That Stood the Test of Time" and details the history...

  63. Smashing the Stack for Fun and Profit

    Article This article is from issue 49 of Phrack Magazine written by Elias Levy who also goes by the handle Aleph One in...

  64. Sniffer FAQ

    Article This article is written by an early computer security company founded in 1994 and later was acquired by IBM in 2006....

  65. Social Engineering A Way of Life

    Article This article is written by the hacker Malefactor [OC] in textfiles.com which provides a guide to hackers and phreaks on social...

  66. Spacewar!

    Digital Artifact This game is a digital artifact of a Javascript version of the popular Spacewar! video game that is one of the...

  67. Stalking the Wily Hacker

    Article This article tells the story of a hacker who penetrated Lawrence Berkeley National Laboratory in the 1980s. It provides an anecdotal perspective...

  68. Stuxnet Worm

    Digital Artifact This article describes the history and technological development of the Stuxnet Worm. The Stuxnet Worm is a malicious computer worm that was...

  69. Technical and Cultural Revolutions

    Video This video is from OSCON 2014 and the keynote speaker Tim O'Reilly, the founder and CEO of O'Reilly Media. From the video...

  70. The Age of AI Hacking Is Closer Than You Think

    This article is adapted from A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend Them Back, by Bruce...

  71. The Art of Deception

    Book This book is a digital artifact used in the course to represent the area of social engineering. The book details several...

  72. The Art of Port Scanning

    Article This article from issue 51 of Phrack Magazine is written by Gordon Lyon aka Fydor about the nmap network scanner. This article introduced...

  73. The Conscience of a Hacker

    Article This article was written by a computer hacker who went by the pseudonym The Mentor. The article sheds light on the...

  74. The First Hacker

    Video This video gives an overview of Rene Carmille's contribution as the first hacker. From the video description: "Based on the extraordinary...

  75. The Government's Fight to Make Encryption Illegal

    Video This video is the third-part of a four part documentary by ReasonTV titled "Cypherpunks Write Code". From the video description: In 1977,...

  76. The Hacker Conference: A Ritual Condensation and Celebration of a Lifeworld

    Academic Paper This paper written by Gabriella Coleman, anthropologist and expert on all things computer hacking, provides a new scholarly perspective on hacker conferences....

  77. The Hacker Crackdown (Complete Book)

    Book The complete online version of the book The Hacker Crackdown. From Wikipedia: "The Hacker Crackdown: Law and Disorder on the...

  78. The Hacker Hacked

    Article This article discusses how the original hacker ethos was "gentrified" by yuppies. The original hacker ethos was wild with an outsider...

  79. The Hackerspace Movement

    Video This video is a Ted Talk given by Mitch Altman, the inventor and creator of the TV-B-Gone technology and famous hardware hacker....

  80. The incredibly intricate badges of Def Con

    Article This article details the creative badges created by hackers for their yearly hacking conference called DefCon. This article specifically details the...

  81. The Light It Up Contest

    Video This video is by the famous hacker George Hotz also known as Geohot. He is known for developing iOS jailbreaks, reverse engineering...

  82. The Newly Reintroduced Phrack Issue 70

    Article This article describes Phrack Magazine's comeback in 2021. Phrack Magazine is an online hacker magazine. This article describes how issues of...

  83. The Return of Anonymous

    Article This article tells the story of the return of the hacking and activist group Anonymous. In 2012 Anonymous reached the height...

  84. The Secret History of Hacking

    Video This video depicts some of the secret side of the history of hacking from black hat hackers to white hat hackers....

  85. ToneLoc

    Article This article from the textfiles website by two hackers with handles Minor Threat & Mucho Maas provide a user manual for the well...

  86. Unauthorized Access

    Video This video is a documentary about hackers by Annalisa Savage from 1994. From the video description, "This is a nostalgic hacker documentary...

  87. Unix Use and Security From The Ground Up

    Article This article written by the hacker The Prophet for textfiles.com about the security and uses of Unix. Hackers in the early 1990s would...

  88. War Dialer

    Digital Artifact This article provides historical context and the technical developments in wardialing and war dialers. War dialing is a technique developed by hackers...

  89. Warez: The Infrastructure and Aesthetics of Piracy

    Book This book is written by Martin Paul Eve, a Professor of Literature, Technology and Publishing, about the Warez Scene and community. This...

  90. Watch Me Demo My New IRC Client on an 80s Retro Computer

    Video This video is a video of a demo of Internet Relay Chat (IRC) on an 80s retro computer. The IRC is highly...

  91. We Are Legion The Story of the Hacktivists

    Video This video is a documentary directed by Brian Knappenberger that gives a detailed look at the beginnings of hacktivist group `Anonymous', and how they...

  92. Wearing Many Hats: The Rise of the Professional Security Hacker

    Article This article in Data & Society is a discussion with Matt Goerzen and Gabriella Coleman about the evolving culture around exploits development....

  93. ‘We Got To Be Cool About This‘: An Oral History of the L0pht, Part 1

    Article This article provides an overview of how the influential hacking group L0pht formed in the 90s. The article tells the story...

  94. What is a Hacker?

    Video This video is produced by The Media Show and has Mitch Altman as a guest to answer the question: What is a...

  95. Writing Reflection 10: Hackers and Leakers

    Writing Reflection In this writing assignment for Ethical and Professional Issues in Notre Dame's Computer Science and Engineering department, students are asked...