www.2600.com
Copyright © 2600 Enterprises, Inc. All rights reserved.

Contents

2023 Spring

Progress of a Sort 
Sleuthing Google Apps Part 2: The Google Application Suite 
What About Tomorrow’s Hackers? 
Hacker Movies 
A Post-Soviet Payphone Trick 
TELECOM INFORMER 
Organizing Music Files With SongRec and Shazam 
What Is a Hacker? 
Automated Vulnerability Scanners and a False Sense of Security 
A COSMORED Configuration Flaw 
A Holistic Approach is Better 
The Great Resignation: Faux Recruiters Social Engineering the **** Out of Applicants 
HACKER PERSPECTIVE 
Hacking The Lenovo 11e Chromebook 
Known Plaintext Attacks Are Caesar-ous Business 
American Shanzai, Part 1 
LETTERS 
EFFECTING DIGITAL FREEDOM 
What is Futel? 
The Power of Try 
AI For Content Generation 
Neuralink Thoughts 
Quantum Computer Algorithms, Part I: Quasi-Classical Methods 
ARTIFICIAL INTERRUPTION 
OpenAi’s Chat-GPT3: A Manipulating PR Tool 
Readme.exe 
A Lifetime of Computing 
HACKER HAPPENINGS 
MARKETPLACE 
MEETINGS


2023 Summer

Artificial Nonsense 
Programming of the Past 
Science Fair and Congressional Farce
A Chain Addition Generator in AWK
Quantum Computer Algorithms, Part II: Amplitude Amplification
The Metaverse Is a Solution Looking for a Problem 
Solipsism, AI, and the Future of Empathy 
TELECOM INFORMER 
Why I Am Not Panicked About Being Replaced by AI 
Social Engineering: Quiet Nights Are Here Again 
Hunting Apps for OSINT 
Hacking the Hackers 
Is There Anything Else I Can Assist You With? 
HACKER PERSPECTIVE 
Giving a Damn: Response to “A Holistic Approach is Better” 
Book Review: The Future of National Intelligence 
American Shanzai, Part 2 
LETTERS 
EFFECTING DIGITAL FREEDOM 
Next Level AI: ChatGPT 
Tomorrow’s Challenges: Non-Fungible Tokens 
ARTIFICIAL INTERRUPTION 
A Tale of Insecurity 
Microsoft, Stop Reading My Emails! 
The Cybiko 
Turing’s Battle 
HACKER HAPPENINGS 
MARKETPLACE 
MEETINGS 


2023 Fall

Memories to Come 
Designing an OpenAI Powered IRC Chat Bot for Fun and Profit 
Cute App, But I’ll Use My Own 
Saying Goodbye to an Old (GPFS) Friend 
TELECOM INFORMER 
The Arrival of 2600 Digital Delivery 
Why Aren’t You Cracking Your Users’ Passwords? 
A Technology Life Story 
Social Engineering is Forever 
Is AI More of a Tool or an Ethical Challenge? 
Quantum Proof Encryption 
But I Don’t Want a Copilot 
HACKER PERSPECTIVE 
Diskless Malware 
Hacking the Airwaves 
Adventures in Zero Trust 
American Shanzhai, Part 3 
LETTERS 
EFFECTING DIGITAL FREEDOM 
Go On a Journey 
Morbid Curiosity in the Weaponized AI Era 
See You on the C-Drive (A Series of Late 20th Century Fragments) 
ARTIFICIAL INTERRUPTION 
Is 2600 Still Relevant? 
Learn Linux, People! 
WasteTrackers and More 
HACKER HAPPENINGS 
MARKETPLACE 
MEETINGS


2022 Spring

Renewed Hope 
How to Create a Practical Burner Phone for the Average User 
Exploring the BACnet Protocol for Fun and Profit 
TELECOM INFORMER 
How to Use Gmail to Send Emails From an SMTP Server That You Do Not Own 
FOIA as Weapon 
Data Analysis as the Next Step 
Web 3.0 is Bullshit 
Book Review: Sandworm 
Why You Need to Self-Host 
Should I or Shouldn’t I? Ransomware Negotiation 
Social Engineering Attacks Out of Control 
HACKER PERSPECTIVE 
Sleuthing Google Apps Part 1: Google Calendar 
I Love Smart Working 
LETTERS 
EFFECTING DIGITAL FREEDOM 
The Phreak’s Field Guide to Identifying North American Phone Switches, Part Two 
ARTIFICIAL INTERRUPTION 
Has the CIA Cloud Service Become More Secure? Negative 
The Author Does Not Exist 
Harnessing Cryptocurrency Miners to Fight Climate Change 
An Atavistic Freak Out, Episode Four 
HACKER HAPPENINGS 
MARKETPLACE 
MEETINGS 


2022 Summer

Social Media Is Neither 
Phishing in 2022 
Plain Text in Plain Sight: Smaller Alternatives to the World Wide Web 
Battle for Better Batteries 
Command Line Unminifier 
TELECOM INFORMER 
The Problem of Effective and Usable Strong Passwords 
Hacking Traffic Lights 
I’ll Take Some Vigenère With My Caesar 
Applications, Places, System: A Personal View of Linux 
Dial-a-Word 
HACKER PERSPECTIVE 
End of the Dream 
Why Exploiters Should Optimize Their Code 
Hacking Into the Past 
LETTERS 
EFFECTING DIGITAL FREEDOM 
The Dark Side of DarkMatter: The Evil Hackers Behind Project Raven 
I Don’t Think I Was Supposed to See That 
About Conversation, Thought, and Language 
ARTIFICIAL INTERRUPTION 
Brute-Forcing a Museum’s Math Puzzle With Python 
Hacking and Politics: Why Talking About Both Matters 
An Atavistic Freak Out, Episode Five 
HACKER HAPPENINGS 
MARKETPLACE 
MEETINGS


2022 Fall

The Rule of Law 
A New HOPE: Release Notes 
The Internet of Problems 
TELECOM INFORMER 
Keeping America Informed: An Introduction to Government Documents 
Windows Installers 
Hack Your Brain 
Hacker Dilemmas 
An Introduction Algorithm to Decoding an Enigma 
Is It Time to Change Our Approach to Security? 
Will You Let Your Car Drive Itself? 
HACKER PERSPECTIVE 
A Ripple Story 
Hackers - What is Our Mission Statement? 
How to Double-Spend a Bitcoin 
LETTERS 
EFFECTING DIGITAL FREEDOM 
Three Rules Against Tech Exposure and Dependency 
Sneakers: 30 Years of a Cult Classic 
Internet Landscape in Germany 
ARTIFICIAL INTERRUPTION 
What's Old is New Again: PDF Malware Part Deux 
What Does "Impossible" Mean? 
Freedom of Speech: Terms and Conditions 
People vs. Corporations 
An Atavistic Freak Out, Episode Six 
HACKER HAPPENINGS 
MARKETPLACE 
MEETINGS


2022 Winter

mtg < 0Inconvenient Truths 
You Can Use the Dark Web for Good 
Degradation as DRM 
We Love Trash 
TELECOM INFORMER 
Friendly Fraud 
Let's Party Like It's 1989 
Current Bulletin Board Systems: How It's Done 
Intercepting Google CSE Resources 
The Infosec Professional Song 
HACKER PERSPECTIVE 
YouTube Is Not a Safe Space 
What Do You Mean You Don't Have a Responsible Disclosure Program? 
The Coolest Hacker Multitool On the Market: The Flipper Zero 
LETTERS 
EFFECTING DIGITAL FREEDOM 
Cyber Security Frameworks 
Music in Ones and Zeroes: A Memory of Streaming Soundscapes 
Cryptocurrency - Busted! 
ARTIFICIAL INTERRUPTION 
Tales for My Toddler 
Raising Generation Orwell: A Guide to Teaching Kids the Human Rights of Privacy 
scan.sh 
The Search for Life at 300 Baud 
Hey, I Paid For This Cabin 
An Atavistic Freak Out, Final Episode 
HACKER HAPPENINGS 
MARKETPLACE 
MEETINGS


2021 Spring

Forward Thinking
Anonymity, Privacy, and Reality
What Hacking My County’s Election Worker Portal Taught Me 
Ham Radio, SMS, and the ISS
Randomize Your Exit Node 
TELECOM INFORMER 
Logging Discord Tokens 
Trojan Detection and Avoidance 
5G Hotspots and Tinc 
Book Review: We Have Been Harmonized: Life in China’s Surveillance State 
A Layman’s Intro to Quantum Computers 
HACKER PERSPECTIVE 
Inside Job: Exploiting Alarm Systems and the People Who Monitor Them 
Why Are We Still Having This Conversation? Embedded Systems Still Not Secure 
LETTERS 
EFFECTING DIGITAL FREEDOM 
How Does NSA’s XKEYSCORE Project Work? 
A Proposal for the Elimination of Passwords 
Life Lessons Can Help You Sneak Into a Crowded Conference 
AI In Dating Simulations Games 
ARTIFICIAL INTERRUPTION 
Hacking HP’s OfficeJet 6310 
The Net As Seen in China 
Picture This 
Why I Am a Hacker: Hacking In the Era of COVID-19 
HACKER HAPPENINGS 
MARKETPLACE 
MEETINGS


2021 Summer

What is Truth? 
More Privacy and Better Security Through Email Diversification 
Three Fundamental Questions 
TELECOM INFORMER 
Fluc Google’s FLoC 
Municipalities Pwned at Greater Rates! 
The Demise of Network Security 
Who’s Training Whom? 
Hacking Motion Capture Software and Hardware 
How to Read 2600 Magazine 
Verified Badges for Everyone? 
Gone Fishin’ 
HACKER PERSPECTIVE 
Vulnerabilities in Deep Artificial Neural Networks 
The Telegraph Regulations and Email 
Facebook and the FBI 
LETTERS 
EFFECTING DIGITAL FREEDOM 
When 5G Technology and Disinformation Collide 
How to Hack the American Mailz 
“Post-Quantum Cryptography” Is Not Going to Work 
Book Review: RESET: Reclaiming the Internet for Civil Society 
Book Review: Rabbits 
ARTIFICIAL INTERRUPTION 
How To Create Your Own Privacy-Enabled Sunglasses 
A File Format to Aid in Security Vulnerability Disclosure 
“Hello fellow sentient being,” 
An Atavistic Freak Out, Episode One 
HACKER HAPPENINGS 
MARKETPLACE 
MEETINGS 


2021 Fall

FREE VIRGILAmplification Gone Wrong 
Wherever You Go, There You Are 
Using “DeepChecksum” to Ensure the Integrity of Backups 
I Thought the Cyberpunk Dystopia Would Be a Hacker Paradise 
Where Have All the Tor Sites Gone? 
TELECOM INFORMER 
The FBI Communications Breach of 2010: Applications and Perspectives 
Book Review: Press Reset: Ruin and Recovery in the Video Game Industry 
The Phreak’s Field Guide to Identifying North American Phone Switches, Part One 
Empty Houses 
The Art of the Troll 
HACKER PERSPECTIVE 
Exploring Old MS Paint Formats 
Keyspace Iterator in AWK 
LETTERS 
EFFECTING DIGITAL FREEDOM 
Hacking NYC MTA Kiosks 
What’s With This Username Stuff, Anyhow? 
The Matrix Is Real: How to Hack Humans for Fun and Profit 
ARTIFICIAL INTERRUPTION 
Why TikTok Activism Made Actual Hacktivism Harder 
Reply to: “Normalizing SASsy Data Using Log Transformations” 
Thoughts on “Verified Badges for Everyone?” 
The Lost Art of Windows 9x Pranking 
An Atavistic Freak Out, Episode Two 
HACKER HAPPENINGS 
MARKETPLACE 
MEETINGS


2021 Winter

The Hacker Curse 
L-Band: Frequencies and Equipment You Need to Know About 
In the Trenches: Working as a Security Analyst 
How to Hack a Router Device Like NSA Employees 
Bitcoin: The Major Difference 
TELECOM INFORMER 
Privacy Matters 
Inside the New World of Cryptocurrency Phishing 
Firewall Netcat 
Hacking the Medical Industry 
Putting Events on Twitter With the Help of Emojis 
The Solution to the Technological Singularity 
HACKER PERSPECTIVE 
leet.c 
Making Boring Work Great Again 
LETTERS 
EFFECTING DIGITAL FREEDOM 
Hacking Dark Souls II 
Tenth Grade Social Engineering Project 
When One Door Closes 
Supply and Demand, Apollo 11, and GitHub 
ARTIFICIAL INTERRUPTION 
Hacking and Knowing - Some Thoughts on Masking Threshold 
Book Review: I Have Nothing to Hide 
Keeping Busy When Retired - It’s Important 
An Atavistic Freak Out, Episode Three 
HACKER HAPPENINGS 
MARKETPLACE 
MEETINGS


2020 Spring

The New Social Disease 
Cracking Your Neighbor's Wi-Fi for $180 
Hax0rz? Sniffing My Critical Infrastructure?! It's More Likely Than You Think! 
Null-Routing Facebook: Using Small Tech to Fight Big Tech 
TELECOM INFORMER 
Hackerspace School 
Learning Programming Through Hacking AOL 
Has Your Password Been Pwned? 
Antique Malware Can Still Bite You 
Thoughts From a Newcomer 
Why Is the DoD on My APN? 
HACKER PERSPECTIVE 
Finding Email Addresses 
More Advanced Processors, Greater Privacy Intrusions 
Printers: The Overlooked Security Concerns 
LETTERS 
EFFECTING DIGITAL FREEDOM 
The USPS Informed Delivery Service as a Phishing Data Source 
Yahoo Groups and the Legacy of Internet Content 
The Freephones of Whidbey Telecom 
Point of Sale Shenanigans: Authorized Unauthorized Transactions 
CITIZEN ENGINEER 
Electric Barons 
Would You Like Some Pancakes With That Breach? 
An Introduction to Chaff - an Anti-Forensics Method 
HACKER HAPPENINGS 
MARKETPLACE 
MEETINGS


2020 Summer

Adaptation 
Skimming Credit Card and ACH Payment Details from Tigerpaw Software Clients 
The Pipe Dream of Sensible School Internet Policy 
Windows Subsystem for Linux. A n00b5 Toy? 
TELECOM INFORMER 
Towards a Secure Telephone Network 
Ghosting an Operating System for Privacy 
Tracking Wi-Fi Devices with Python and GPS 
HACKER PERSPECTIVE 
Industrial Control Systems and Cybersecurity 
Bad ISP OpSec 
Anonymous Temporary Storage and Retrieval 
How to Become a Hacker in 24 Hours 
Thinking in AI 
LETTERS 
EFFECTING DIGITAL FREEDOM 
Fun with Text to Speech 
Hacker Email 
Cerebral Spill 
OhNoDaddy: GoDaddy Compromised 
Book Review: The History of the Future 
ARTIFICIAL INTERRUPTION 
The Rise of the Machines - Learning to Detect DGAs 
Responsible Disclosure of a Malware Infiltration Attempt 
Fiction: Hacking the Naked Princess 0x19 
HACKER HAPPENINGS 
MARKETPLACE 
MEETINGS


2020 Fall

The Blame Game 
Smile, You're On Camera 
Cyber-Pandemic: The World in Ruins 
Understanding Election Security Through the Lens of the Hierarchy of Voter Needs 
HOPE 2020 Fulfilled - Debrief Overview 
TELECOM INFORMER 
Hacking Rotary Dials 
QR Chaos 
Knowing What To Search For 
HACKER PERSPECTIVE 
Clean Rooms and Reverse Engineering 
Searching Government Quiz Sites for Hidden Answers 
Taking Control of Your Devices 
LETTERS 
EFFECTING DIGITAL FREEDOM 
The NSRL For Hackers 
Make Viri Great Again 
ARTIFICIAL INTERRUPTION 
What's Old Is New Again - We Are Still Jackpotting ATMs 
Facebook's Efforts Against Ad Blocking 
Red Light Robin Hood 
The Elements of a Raven Matrix 
HACKER HAPPENINGS 
MARKETPLACE 
MEETINGS 


2020 Winter

Errors in Freedom 
The TikTok Spyware Conspiracy 
Hacking Digital Signage Screens 
TELECOM INFORMER 
How To Write Malware in PowerShell - Tips and Tricks 
Beyond the Breach: An In-Depth Look into the Cyberinsurance Industry 
Right To Be Forgotten - Network and Home 
What Three Words, and Your 2600 Meeting 
HACKER PERSPECTIVE 
The Brazilian Phone System Revisited 
Hacking the Game Rules 
Book Review: If Then: How the Simulmatics Corporation Invented the Future 
LETTERS 
EFFECTING DIGITAL FREEDOM 
Hosting Under Duress 
How One "S" Can Make a Difference 
COVID-19: A Tale of Two Mindsets 
Normalizing SASsy Data Using Log Transformations 
ARTIFICIAL INTERRUPTION 
Work From Home Through P2P Network 
Chromebook as a Web Hacking Platform 
Thinking in AI - Can AI Wake Up? 
Thoughts on Bitcoin 
HACKER HAPPENINGS 
MARKETPLACE 
MEETINGS


Spring 2019

Preserving the Future 
Reverse Engineering Android Apps 
Android Smartphone Secret Codes: Revealed 
How to Make Your eBooks Inheritable 
TELECOM INFORMER 
Web Scraping Scripts 
Performing a MacGyver to Call Anyplace Home 
Blast Accusations for Cybersecurity Intel 
HACKER PERSPECTIVE 
Be a Good BitTorrent Citizen 
A Guide to ALKEMI 
LETTERS 
EFFECTING DIGITAL FREEDOM 
Second-Generation Quantum Computers 
In-Browser Cryptojacking: An Old Threat in a New Guise 
So You Want to Be a Coder 
CITIZEN ENGINEER 
Lights Out! Guerilla Radio 
Why You Should Always Give out Your Telephone Number
with the Area Code 
We Just Called Them Dialers 
Book Review: Weapons of Math Destruction 
HACKER HAPPENINGS 
MARKETPLACE 
MEETINGS


Summer 2019

Convictions 
Porting IoT Malware to Windows 
There Is No Magic in the Clouds 
TELECOM INFORMER 
Dank Kush or Fleet Vehicles? 
How to Defeat Intelligence Tests 
Connecting to the Internet for Free Using Iodine 
Book Review: Broad Band: The Untold Story of the
Women Who Made the Internet 
We Will Rock You 
HACKER PERSPECTIVE 
The Hacker Mindset or How We Can Move the World 
Let's Just Call It BitCon 
The Madness Debate (or How I Got Locked out of My Computer) 
LETTERS 
EFFECTING DIGITAL FREEDOM 
Mechanical Keyboards 
The Multiple Persona Theory of Digital Secrecy 
Mini Mate - Rescuing Hardware from the Graveyard 
CITIZEN ENGINEER 
Get Those Digits 
Potential VPN Attacks 
Working for an ISP 
Fiction: Hacking the Naked Princess 0x17 
HACKER HAPPENINGS 
MARKETPLACE
MEETINGS


Autumn 2019

Our Audacity 
Fully Homomorphic Encryption and Privacy 
Who Is Watching Us?
TELECOM INFORMER 
The Mysteries of the Hidden Internet 
Breaking DirecTV’s DVR Authentication 
Machine Rhapsody in 2099 
Introduction to Computer Viruses,
Example in Windows Powershell 
All You Need is... Air 
HACKER PERSPECTIVE 
Twitter the Enemy 
Student Privacy by Practice - Not by Policy 
Online Thrift Stores Have Your Data 
LETTERS 
EFFECTING DIGITAL FREEDOM 
Active Defenses for Industrial Espionage 
The Infocalypse 
Book Review: The Big Nine:
Tech Titans and Their Thinking Machines 
Book Review: A People’s History of
Computing in the United States 
CITIZEN ENGINEER 
The Case Against Certified Ethical Hacking 
Thoughts on Account Enumeration 
Arduino-Based Burglary Zone Input Tester 
“Information is Neutral” and Other Social Myths 
HACKER HAPPENINGS 
MARKETPLACE 
MEETINGS


Winter 2019

From the Ashes 4From the Ashes 
Industrial Control with Modbus 
Ideas Behind Site Reliability Engineering 
Cyberspelunking 
TELECOM INFORMER 
Steganographic Filesystems 
Death of a Scene 
Body Key-Logging 
HACKER PERSPECTIVE 
Rehabilitation Center
(Attacker's) Mission Complete 
How to Get Free Wi-Fi Anywhere 
What is Hacking? 
LETTERS 
EFFECTING DIGITAL FREEDOM 
Maximizing Privacy in a Digital World 
Do-It-Yourself Cloudflare on a Budget  
Book Review: Artificial Intelligence: A Very Short Introduction 51A Very Short Introduction 
CITIZEN ENGINEER 
Reflections on Hackers 
Pass the Cookie and Pivot to the Clouds 
Fiction: Hacking the Naked Princess 0x18 
HACKER HAPPENINGS 
MARKETPLACE 
Student Privacy by Practice - Not by Policy
MEETINGS 


Hacker Digest 35 - 2018

Embracing Empowerment 
The Secrecy and Security of the Special Counsel 
What Programming Language Should I Learn? Why Not All of Them? 
Breaking Standards 
TELECOM INFORMER 
How to Run an I2P Hidden Service 
Bitcoin or Bit Con? One Newbie’s Adventures in Cryptoland 
The Case of the Murderous AI 
In Defense of the Net 
HACKER PERSPECTIVE 
A Review of CopperheadOS 
SSH Keys and Challenges in Enterprise Environments 
Unlocking the Secret of Keys 
EFFECTING DIGITAL FREEDOM 
Hacking Our Attitudes (The Key to Being a Better Attitude Trumper) 
Historic Hacking 
CITIZEN ENGINEER 
Bluetooth Hacking 101 
Hidden ISPs 
Extrapolating Phone Numbers Using Facebook and PayPal 
The Free Flow of Information 
Celebrate the Difference 
A N00b’s Guide to the Dark Web 
The IPv6 Delusion 
TELECOM INFORMER 
How to Be a Guitar Hero, IRL 
Even Restaurants Need InfoSec 
Serial Number Cracking For Fun and Profit 
Automating a Police State 
HACKER PERSPECTIVE 
Brute Forcing a Car Door with Math 
Hack(ed), the Earth 
EFFECTING DIGITAL FREEDOM 
A Hacker Adventure in Urban Exploration 
Beyond the Scare-Mongering 
CITIZEN ENGINEER 
Re-Purposing Old Technology and Ideas for Fun and Emotional Profit 
Hacking: Quick and Easy 
Thoughts On Cryptocurrency 
Fiction: Hacking the Naked Princess 0x15 
PAYPHONE PHOTO SPREAD 
Injustice for All 
Digital Sanctuary Cities 
Removing eBook DRM without OCR or GUIs
Communiques, Procedures,
Decrees, Specifics
THE HACKER DIGEST - VOLUME 35A Carrier Pigeon Revisited
The Evolution of Ran$omware
TELECOM INFORMER
Hackers to the Rescue! (Maybe)
Book Review: The Art of Invisibility
GDPR – Active Empowerment vs. Passive Consumerism
A Characteristic Study of IoT Botnets: Understanding the Design and Behavior
HACKER PERSPECTIVE
Ms. Reality Winner is an American Dissident 
More Ways to View Hacking 
EFFECTING DIGITAL FREEDOM 
Totalitarian Control: How We Used PowerShell to Manipulate User Behavior 
What Do Lawyers and Hackers Have in Common? 
No Country for Incarcerated Hackers 
CITIZEN ENGINEER 1
Bypassing Email Anti-Spam Filters 
Hacker History: MDT or “The Mass Depopulation Trio” 
Testing Your l337 h4x0r skillz Safely and Legally 
Gone Phishin’ 
Taking Back Ownership 
1979 Plus 40 Years 
AV1: One Giant Leap for Video-Kind 
YITM 
Social Engineering from Prison 
A Brief Tunneling Tutorial 
TELECOM INFORMER 
Quantum Computers and Privacy 
Hacking the School System 
A Reading of the AI Hype Meter 
HACKER PERSPECTIVE 
Thumbcache.db Primer 
Sorting It All Out:
The Long Lost Bastard Children of the United States Postal Service 
Configuration Negligence: Who is Responsible? 
EFFECTING DIGITAL FREEDOM 
Facts About Honesty/Integrity Tests and Interviews 
Book Review: Surveillance Valley: The Secret Military History of the Internet 
Book Review: Ten Arguments for Deleting Your Social Media Accounts Right Now 
Modem and Me: The Loose Ends 
CITIZEN ENGINEER 
A Fork() in the Road 
Making an Informed Business Decision Using Public Financial Records
To the Unknown Hacker 
Hacking in a Slow Job Market 
Fiction: Hacking the Naked Princess 0x16 
LETTERS TO 2600 
2600 MEETINGS 2018 
BACK COVER PHOTO SPREAD


Hacker Digest 34 - 2017

A Price for Truth 
New U.K. Surveillance Laws - Time to Get Serious About Security 
Voices in the Sky: Satellite Communication Methods 
Lockbox PIN Code Generator 
A Lock with the Key Next to It 
Hacking Free Wi-Fi on Delta Flights 
TELECOM INFORMER - SPRING 
Telephones from Space 
Longing for the Past 
Getting Inspired as a Student 
Google Auto-Fill Suggestions, Politics, and Magic 
The Inner Circle... Part One 
HACKER PERSPECTIVE - SPRING 
Software Cracking with dotPeek 
Ignore Your .env - Browsing Environment Files on GitHub 
Obfuscating Torrent Traffic 
Successful Network Attacks - Phase Two 
White House Phone Numbers 
How to Improve Zone Protection in Burglary Alarms 
EFFECTING DIGITAL FREEDOM - SPRING 
Validating Software Validation 
Thoughts on Phoenix Project II 
Those Coca Cola Freestyle Machines in Crew Mode 
321 Studios Revisited 
The Power of the Press 
The Censorship Resistant Internet: How to Run a Tor Hidden Service 
Converting the Voter Database and Facebook into a Google for Criminals 
Hactivism to End Human Trafficking and Modern Day Slavery 
TELECOM INFORMER - SUMMER 
How Rogue One Taught Me Not to Be a Bad Guy 
A Declaration of Independence for Cyberspace 
Demonsaw: Bypassing Anonymity Utilizing Social Engineering 
Creating an Automated Open Wi-Fi Traffic Capturing Tool for Under $20 
0x8bc4 Before You 0xffe0 
HACKER PERSPECTIVE - SUMMER 
My Perspective 
OPTingOUT 
Analog vs. Digital Living: Real Solutions to Absolute Anonymity and Privacy 
EFFECTING DIGITAL FREEDOM - SUMMER 
Building a Better Screen Locker for GNU/Linux 
CITIZEN ENGINEER - SUMMER 
VR Trumpers 
Successful Network Attacks - Phase Three 
Advice from the Socially Engineered 
Chemicals, Ensemble, Peaceful
Assembly, Transmission
Internet Thoughts 
Fiction: Hacking the Naked Princess 0x13 
PAYPHONE PHOTO SPREAD 
Acts of Courage
Bypass Your ISP’s DNS and Run A Private OpenNIC Server 
PHP Backdoors 
Inseparable: The Intersectionality of Hacking and Politics 
TELECOM INFORMER - AUTUMN 
Enhancing SQL Injection With Stored Procedures 
How to Get Nearly Free Travel from Scotrail 
(learn (LISP)) 
Reverse Engineering Electronic Letter and Number Toys 
How to Hack Your Way to a Guilt-Free, Political Ideology 
The Problem with IT Certifications and the Devaluation of Technology 
HACKER PERSPECTIVE - AUTUMN 
A Little Brother’s Manifesto 
A Test Harness for Fuzzing Font Parsing Engines in Web Browsers 
EFFECTING DIGITAL FREEDOM - AUTUMN 
Confessions of a (for Now Not So Successful) Bug Bounty Hunter
To Care or Not to Care 
Scrape Textbooks, Save Money 
googlecomp.py: The Complete Google Autocomplete Script 
CITIZEN ENGINEER - AUTUMN 
Obfuscating Biopolitics: A Theoretical Primer for Cyborgs and Others 
Debt Journey 
Successful Network Attacks - Phase Four 
Splatter 
Credit Denial 
Using dnscat2 for Encrypted C&C over DNS 
Educating Friends and Family About Online Security 
Creating Strong and Easy to Remember Passwords 
Don’t You Have a Smart Watch Yet? 
TELECOM INFORMER - WINTER 
What Happens When WHOIS Data Is Made Public 
Deauthing the Neighbors, or Ring Theory 
Nightmare on E Street (Modem and Me Against the World) 
HACKER PERSPECTIVE - WINTER 
Quantum Computers and Bitcoin 
I Want to Be a Hacker.... 
EFFECTING DIGITAL FREEDOM - WINTER 
Conventionalist Theory of Reference in Comparison to Programming Language 
Down and Out in a Land of Script Kiddies 
Dispelling a Breach Rumor 
CITIZEN ENGINEER - WINTER 
The Russian Hacking Diatribe, and Why It Is Complete Agitprop Nonsense
Successful Network Attacks - Phase Five 
Fiction: Hacking the Naked Princess 0x14 
LETTERS TO 2600 
2600 MEETINGS 2017
BACK COVER PHOTO SPREAD


Hacker Digest 33 - 2017

The Powers That Want to Be 
Scraping for Cache, or It’s Not Piracy If You Left It Out in the Open 
Hacking Using Parse Database Injection 
Hardware Hacking - Protecting Dev’ Board I/O by Hacking an Alarm Panel 
TELECOM INFORMER: SPRING 
My President Twitter Bot Experiment 
Defense Against the Black Arts of Forensics 
A Plan 9 Primer 
Chesslin 
Exploiting HTML - Making Your Browser a Vegetable 
Exif Location Recon with Python 
HACKER PERSPECTIVE: SPRING 
Eleventh Graders and Nuclear Bombs 
Which Do We Prefer: Neanderthals or Hackers? 
One Little Pig 
Password and Mobility Security: Something Needs to Be Done 
Another Solution to the USBKill.py Problem 
Software Validation 
EFFECTING DIGITAL FREEDOM: SPRING 
Reconnaissance at Spa World 
My Local Weather Observations 
Fiction: The Bee in Van Pelt Park 
Politics Comes Calling 
Pre-Surveillance of Law Enforcement Using Targeted Advertising 
Abandoned Routers: Forgotten, But Not Gone 
Card Transactions Explained 
To Hack an Uber 
TELECOM INFORMER: SUMMER 
Hacking Malaysian Routers 
Nigrum Libro Interceptis: Secundae 
$35 Hacking Machine 
Accidentally Logging In As Admin 
HACKER PERSPECTIVE: SUMMER 
Gaming Ingress 
Learning Hacking via MinecraftEdu 
Typing Fractions in Emails and Text Files 
Surfing the Web Safely and Anonymously with Whonix 
How I Socially Engineered a Job 
Why We Need Privacy Rights 
EFFECTING DIGITAL FREEDOM: SUMMER 
Dictation & Crossfire
“crossfire” by MICHAEL BROWN is licensed under CC BY 2.0
Free Windows 
The Top Ten Reasons Why Hackers Should Get a Ham Radio License 
Fiction: Hacking the Naked Princess 0x10-0x11 
PAYPHONE PHOTO SPREAD 
Promises 
Hacking for Knowledge 
MOV Before You JMP 
It’s Security, Stupid 
Freedom of Thought 
TELECOM INFORMER: AUTUMN 
A Captive Portal Puzzle at Sea 
Spyware Techniques 
Building DIY Community Mesh Networks 
Musical Monstrosities 
HACKER PERSPECTIVE: AUTUMN 
The PirateBox 
How to Google Bomb Someone 
Verizon’s HOPE Scam 
The Easiest Way to Break Into a Bank 
Hacking Amazon E-Books with Spy Style 
EFFECTING DIGITAL FREEDOM: AUTUMN 
A Parallel President on Twitter 
Dark Bubbles 
Rescuing Fake Memory Devices 
Having Fun with In-Store Chromecast 
The Coca-Cola Blacklist 
Bypassing Privileges with Oracle Database Express Edition 11g Release 2
TELECOM INFORMER: WINTER 
Using Discord Servers to HTTP Flood 
Successful Network Attacks - Phase One 
Spying Across Borders in the Age of Email 
InfoSec at Its Worst, OPSEC at Its Best
HACKER PERSPECTIVE: WINTER 
Can Security Be Built into Pure Data? 
mcquery.js - a Web Scraper for Disc Golf Players 
KBChat - Private, Encrypted Chat via KBFS 
2600 Leak Department 
Memory Lane 
EFFECTING DIGITAL FREEDOM: WINTER 
Rotten Apples: OS X 101 
Automatic Contest Winning via Selenium 
The One About That File Server 
Fiction: Hacking the Naked Princess 0x12 
LETTERS TO 2600 
2600 MEETINGS 2016 
BACK COVER PHOTO SPREAD


Hacker Digest 32 - 2016

Nous Défions Tout 
So, You Want to Be a Darknet Drug Lord.... 
Out of the Box Survival - A Guide to PowerShell Basics 
TELECOM INFORMER: SPRING 
Brazil’s Electronic Voting Booth 
Evolution of a Hack 
Bleeper - Downloading Full-length Preview MP3s from bleep.com 
The Enterprise, the Subverted PKI Trust Relationship, and You 
HACKER PERSPECTIVE: SPRING 
WYSE Moves 
Office Talk or Social Engineering? 
Archiving ComiXology 
McAfee Family Protection - Epic Fail! 
Abusing the Past 
Hacking the HandLink Gateway 
EFFECTING DIGITAL FREEDOM: SPRING 
Ohio Prison IT Security from the Inside 
Hacking For Knowledge 
Linux Containers for Event Training 
Are Smart Meters the End-All? 
Old and New Together 
I Tapped That... Tapping a Nationwide Telecommunications Network 
Use Your 3D-Capable TV to View 3D Stills of Your Own Making 
A Phone Story 
TELECOM INFORMER: SUMMER 
Chiron and Me: Hacking Astronomy 
Nigrum Libro Interceptis 
HACKER PERSPECTIVE: SUMMER 
Library Security 
Decoding a Carrier Pigeon 
Attitude Adjustment: How to Keep Your Job 
Out of the Box Survival, Part Two 
EFFECTING DIGITAL FREEDOM: SUMMER 
Coding as a Foundational Skill 
A Plea for Simplicity 
Ransomware: Still Active and Looking for Victims/Volunteers 
Fiction: Hacking the Naked Princess 0xD-0xE 
PAYPHONE PHOTO SPREAD 
The Hacker Image 
A Primer on Home Automation (and How Easy It Can Be) 
Dangerous Clouds 
Unexpected Denial Of Service 
A Convenient Method for Cloud Storage with Preserved Privacy 
TELECOM INFORMER: AUTUMN 
Ashley Madison Military Sites 
The Technology at QPDC 
Open Source Repository Abuse 
My Voice Is My Key 
HACKER PERSPECTIVE: AUTUMN 
Fun with Billing Forms and International Debit Cards 
Going Nuclear - A Tale of Revenge 
LEAKED DOCUMENTS 
Malware Attacks - Leave Those [Banks] Alone 
Mr. Robot - A Ray of Light in a Very Dark World 
Cruising the Wideband Spectrum 
EFFECTING DIGITAL FREEDOM: AUTUMN 
The Dawn of the Crypto Age 
Account Hack: Anyone Can Be a Victim 
Fiction: The Stars Are Tomorrow 
The New Normal 
The Best Way to Share a Treasure Map 
USBkill - A Program for the Very Paranoid Computer User 
Circumventing Chrome and Firefox’s Third Party Cookie Block 
TELECOM INFORMER: WINTER 
Pushing the Limits 
Romeo Tango Oscar 
Yull Encryption 
A Brief Cryptanalysis of Yull 
HACKER PERSPECTIVE: WINTER 
How to Get Free Gogo In-Flight Internet Access 
Accessing Admin Privileges: A Quest Through One of Mac’s Backdoors 
Perspectives on Cyber Security 
The Splotchgate Saga 
Hackerspaces: A Definition 
You Gotta Learn From This, Kid 
The Limits of Open Source Hardware 
EFFECTING DIGITAL FREEDOM: WINTER 
Rewriting History 
The Herculean Task of Making a Documentary on the History of Hacking 
Fiction: Hacking the Naked Princess 0xF 
LETTERS TO 2600 
2600 MEETINGS 2015
BACK COVER PHOTO SPREAD


Hacker Digest 31 - 2015

Thirty Years On 
Lessons from “Secret” History 
Google’s Two-Factor Authentication: The Sneaky Trust Feature 
Identity and Encryption Verification 
Asterisk: The Busy Box 
Using Square to Obtain Dollars at a Reasonable Rate 
TELECOM INFORMER: SPRING 
Robbing the Rich Using Bitcoin 
The Night the ATM Went Down on Me 
Android Reversing Bootcamp 
Hacking Commercial Maytag Washers and Dryers 
HACKER PERSPECTIVE: SPRING 
Accessing Data Structures in a Randomized Address Space 
A Little Excitement Never Hurt Anybody! 
Brute-forcing PIN Code Keypads Using Combinatorial Mathematics 
Building a Community Forum 
Why IMDb Got a Captcha 
At Home Malware (and Online Ads) Protection 
Automated Target Acquisition 
Fiction: Lock and Key 
Watching the Watchers 
Sabotage The System: Encryption as Surveillance State Monkey Wrench 
Crossover: Where Metal and Hacking Met and Mixed 
TELECOM INFORMER: SUMMER 
Fun With the Minuteman III Weapon System – Part Three 
Fun with Data Entropy Attacks 
Network Condom 
Yippie Ki-Yay: Social Engineering and Film 
Hack Your House 
Corporate Security and Chinese Hacking 
HACKER PERSPECTIVE: SUMMER 
Experiences of a Hobo Security Consultant 
“My Precious...” (Apple) 
Hacking the SanDisk Connect Wireless Media Drive 
Toilet Hacking 
“Good Afternoon. This is Your Fake AV Calling.” 
Future Visions 
Closing the Schism Between Hackers and the Law 
Fiction: Hacking the Naked Princess 10 
PAYPHONE PHOTO SPREAD
A Tale of Many Hackers 
The Demoscene - Code, Graphics, and Music Hacking 
Bugging a Room with an IP Phone 
TELECOM INFORMER: AUTUMN 
Hack the Track: Put Your Money Where Your 0wn Is! 
Linux Pwned - Just Not By Me 
Writing Buffer Overflows for Non-Programmers 
Remailing with USPS 
Forensic Bioinformatics Hacks 
HACKER PERSPECTIVE: AUTUMN 
Spam: Where Does It Come From? 
Checkmate or How I Bypassed Your Security System 
Installing Debian on a Macbook Pro without rEFInd or Virtual Machines 
Film Review: Die Gstettensaga: A Call to Class Consciousness for Hackers 
Xfinite Absurdity: True Confessions of a Former Comcast Tech Support Agent 
EFFECTING DIGITAL FREEDOM: AUTUMN 
Covert War-Driving with WiGLE 
Quantum Computers for Code Breaking 
InfoSec and the Electrical Grid: They Go Together Like Peas and Carrots 
Tools for a New Future 
Password Cracking in the Modern Age 
What Do Ordinary People Think a Hacker Is? 
Security Behavior 
TELECOM INFORMER: WINTER 
Format De-Shifting 
Simplocker Gonna Get’cha 
Home Depot Hacks 
Leeching Music From YouTube For Fun, Learning, and Profit 
Recon on Disney’s Magic Band 
How Portable Can Wi-Fi Get? 
HACKER PERSPECTIVE: WINTER 
The Surveillance Kings: Who’s Really Behind Who’s Watching Us 
Taking Your Work Home After Work 
The Perils of Lackadaisical Updates 
Crypto Systems Which Resist Quantum Computers 
The 21st Century Hacker Manifesto 
EFFECTING DIGITAL FREEDOM: WINTER 
Are You the Consumer, or the Product? 
Generating Phone Numbers 
Hacking Dudley 
Fiction: Hacking the Naked Princess 0xB-0xC 
LETTERS TO 2600 
2600 MEETINGS 2014 
BACK COVER PHOTO SPREAD


Hacker Digest 30 - 2014

A Lost Promise 
Guest Networks: Protection Less Than WEP? 
Practical Cryptanalysis 
Twitter For Fun and Profit 
Warning for Ye Olde Bank: Don’t Do This! 
TELECOM INFORMER: SPRING 
Social Engineering: Tactics for Prevention 
Extra-Legal Harassment 
HACKER PERSPECTIVE: SPRING 
Book Review: Exploding the Phone 
Fiddler - Never Trust the Client 
U.S. Department Of State Loves Mexico 
Hypercapitalism and Its Discontents 
Fun with Base Math 
Cracking Push-Button Locks 
Brute Force Access 
The Usage of the Assumption Technique in Social Engineering 
TRANSMISSIONS: SPRING 
Dev’ing an OS 
Learning, Hacking, and the Raspberry Pi 
The Road to Safety 
Splunking the Google Dork 
Fun with the Minuteman III Weapon System 
My First Blackhat 
How to Create and Operate a Temporary Free Autonomous Zone 
TELECOM INFORMER: SUMMER 
A Broad Spectrum of DRM 
Getting Free Media - All Without Torrents! 
A Beginner’s Guide to Social Engineering 
Why Your Grandparents Don’t Like the Internet 
What Made Unix Great and Why the Desktop is In Such Bad Shape 
HACKER PERSPECTIVE: SUMMER 
0-Day Adventures 
How a Prehistoric Hacker Got Started 
The Weather Outside is Frightful/Bulls-Eye on the Banks - Again 
Exploiting the Postal Service Address System for Personal Gain 
A World without Security 
Book Review: Pirate Cinema 
Cyber Attacks on Equities Markets 
Static Code Analysis Using Watchtower 
TRANSMISSIONS: SUMMER 
Tracking Users on Trustworthy Sources 
A Response to “Perfect Encryption - Old Style!” 
Fiction: Hacking the Naked Princess 6 
PAYPHONE PHOTO SPREAD 
The Right to Know 
An Introduction to Bitcoin 
Bitcoin: The Hacker Currency? 
Inquiring Minds = Hacker = Design Engineer 
Hacking The Apple Collective 
Internet Trolls 
TELECOM INFORMER: AUTUMN 
Controlling the Information Your Android Apps Send Home 
U-verse Networking 
Scamming the Scammer: A Fun Way to Respond to a 419 Scam 
The Art of War and What IT Professionals Can Learn from It 
Access Tandem Codes and the Hidden Phone Network 
HACKER PERSPECTIVE: AUTUMN 
Palo Alto NGFW Insider 
Identity Management and Its Role in Security Strategy of Enterprise Environments 
Defeating Forensic Attacks on Full Disk Encryption 
Bank Notes 
TRANSMISSIONS: AUTUMN 
Relax, We Bought Security 
Clouds, Clouds, Clouds... 
Lights, Camera, Hack! 
Fiction: The Error 
Dissent or Descent 
ID3 Tag Messages 
Privacy - A New Hope Through Tails 
Fun with the Minuteman III Weapon System - Part Two 
TELECOM INFORMER: WINTER 
The Many Vulnerabilities of Verity Parental Control 
Anonymity and You, Firefox 17 Edition 
Wi-Fi Security: Attack and Defense 
The Maturation Cycle of a Hacker/There is Never a Free Lunch 
HACKER PERSPECTIVE: WINTER 
CYA Using a Pi to Pivot 
Pretty Good Privacy 
Hacking Your Mother Tongue to Obfuscate your Encryption 
The Growing Schism Between Hackers and the Law 
Netcam: Basics and Vulnerabilities 
TRANSMISSIONS: WINTER 
All I Want is Total Freedom 
Fiction: Hacking the Naked Princess 7-9 
LETTERS TO 2600 
2600 MEETINGS 2013 
BACK COVER PHOTO SPREAD


Hacker Digest 29 - 2013

Game Changing 
A PHP Rootkit Case Study 
Denial of Service 2.0 
Spoofing MAC Addresses on Windows 
GroupMe: A Modern Approach to Social Engineering 
TELECOM INFORMER: SPRING 
Curiosity Killed the Cat 
Stupid 9-Volt Tricks 
So... I Bought a Chromebook 
Hacking Giveaway of the Day (GOTD) 
How to Avoid the Online Dating Scam 
RTF...TOS
Domain and Security 
HACKER PERSPECTIVE: SPRING 
Towards a Hacker Friendly Mobile World 
LinuxLive... Save Me 
The Major Flaw of Pentesting 
Free Music: The Quest for the MP3 
An EMP Flash - It All Stops 
Learning from Stratfor: Extracting a Salt from an MD5 Hash 
TRANSMISSIONS: SPRING 
Control4 and Home Automation 
Backdooring with Metasploit 
My Grandpa's Books Never More! 
Insurgent Technology: In WikiLeaks’ Wake 
The Pros and Cons of Courses 
Scales of Inequality 
Bluetooth Hunter's Guide 
Security by Obscurity = Insecurity 
Building a Cat-5 Cable Tap 
NGFW - Not Grandpa’s Firewall 
TELECOM INFORMER: SUMMER 
A Counterpoint to “The Piracy Situation” 
The Piracy Situation: The Devil’s Advocate 
Why is Piracy Still Allowed? 
The New Age of the Mind 
Building the Better Brute Force Algorithm 
HACKER PERSPECTIVE: SUMMER 
Firewall Your iPhone 
Memoir of a Tech Writer: The Art of Leverage 
Say It Ain’t So Verizon 
Hacking Climate Change With WeatherLink 
Baofeng UV-3R: The Cheapest Dual-Band Ham Radio HT 
TRANSMISSIONS: SUMMER 
Metaphasic Denial of Service Attacks 
Never Be ON TIME Again! 
PAYPHONE PHOTO SPREAD 
The Eyes Have It 
Technology at the Federal Bureau of Prisons 
Using Bluetooth Devices as an Additional Security Measure in Linux 
Hackers Indispensable for Volunteer Groups 
TELECOM INFORMER: AUTUMN 
The Quadcopter Crash Course 
Spear Phishing at a Bank - A Hard Lesson Learned 
Restoring Honest Elections 
Hackers In Space 
Hacking Apple’s System 
Fundamental Flaws in Online and Phone Ordering 
HACKER PERSPECTIVE: AUTUMN 
Beware the Cyber Weapons Industrial Complex 
XML Automated Gambling 
Stuxnet: An Analysis 
How to Leech from Spotify 
TRANSMISSIONS: AUTUMN 
Radio Redux 
Physical Security Threat from Hotel WiFI 
A Nice, Hot, Socially Engineered Meal 
Storm Clouds 
Basic Code Breaking 
An Overview of the Security Benefits Offered by Desktop Virtualization 
Hardware Hacking - An Introduction Via Dev’ Boards 
Hacking Walgreens Photo Processing Machines 
TELECOM INFORMER: WINTER 
C is for Camouflage 
A Method to Spider Sites with Teleport Pro 
Steganography over Covert Channels 
New Ways of Ranking Documents 
Hacking Dirt 
HACKER PERSPECTIVE: WINTER 
The Security Funnel: When OpenVPN Meets Tor 
Tactical Teensy Rapid Recon 
Alternate Method for Creating an SSH Tunnel with PuTTY and Squid 
How to Survive a DNS Attack 
The Breach That Wasn’t 
TRANSMISSIONS: WINTER 
Wordpress Exploit Immunization 
Fiction: Hacking the Naked Princess 1-5 
LETTERS TO 2600 
2600 MEETINGS - 2012
BACK COVER PHOTO SPREAD


Hacker Digest 28 - 2012

A World Spinning 
Password (In)Security? 
Password Bypassing and Clearing 
How Good is Geolocation? 
TELECOM INFORMER: SPRING 
Why I Like E-books 
What is a Hacker? 
Who is Anonymous or How to Troll the Media for Fun and Profit 
How to Accept Payments Anonymously - A Digital Currency Guide 
How to Find Out What the Government Knows About You 
Bypassing JavaScript Timers or How I Learned to Stop Waiting and Love the Variable 
Remote Login Made Easy 
Two Party Covert Communication over MSN Messenger System using Emoticons 
Virtual Anti-Forensics 
HACKER PERSPECTIVE: Katherine Cook 
Secrets of the Spider 
The Lessons Learned on a Training Site 
Writing Bots for Modern Websites 
Where Have All Our Secrets Gone? 
LDAP Directory Servers: TMI! 
Computers: With and Without
Automatic Usage of Free Wi-Fi 
TRANSMISSIONS: SPRING 
Coding Bots and Hacking WordPress 
Abusing The Cloud 
Progress Report 
Dealing with Credit Card Companies 
Detecting and Tracking Stealth Satellites 
Pen Testing from a Mile Away 
Securing Online Voting 
TELECOM INFORMER: SUMMER 
Mobile Hacking with Android 
How I Escaped Google 
Add a User With Root Privileges Non-Interactively 
Simple RSA Encryption 
Booze, Nosiness, and City Terminals 
HACKER PERSPECTIVE: KC 
How to Protect Your Car from Radio Jammers 
POCSAG and Radio Privacy 
Auditing the MiFi2200 
Hiding the Hacker Instinct 
Starting a Path to Modern Database Privacy 
TRANSMISSIONS: SUMMER 
A Brief Guide to Black Edition XP 
The Many Uses of SSH Tunnels 
Senatorial Courtesy Plates - An Inside Look 
Fishing with Squid 
PAYPHONE PHOTO SPREAD 
Awakenings 
New Thoughts
and Eye Candy
Introduction to Chrome OS 
Bypassing Shell Restrictions 
Phishing on an iDevice 
TELECOM INFORMER: AUTUMN 
Network Anonymity Through “MAC Swapping” 
Both Sides of the Story 
Video Game Hacking 
Hacking Alt Detection in Second Life 
HACKER PERSPECTIVE: Bruce Sutherland 
How to Spoof Another User in MindAlign 
Access Control: A Fancy Facade 
Go Daddy Shared Hosting Review 
Logging and Analysis with Your GPS-enabled Phone 
Cellphone, Keys, Wallet? Check! 
Mobile Hacking: Really 
TRANSMISSIONS: AUTUMN 
Asterisk, The Gatekeeper 
Wear a White Hat 
How I Got Firefox to Accept the Tel Tag for Phone Calls 
Movements 
Google Temphptations 
Free Phone Numbers with Google Voice 
Abuse Reports Still Work 
MAC Spoofing Your Way to Free Internet 
Hacking Refog Keylogger 
TELECOM INFORMER: WINTER 
Who is Anonymous? 
Property Acquisition - For Free? 
Let’s Feed the Phishes 
Bypassing Universal Studio’s MP3 Security the EZ Way 
Internal Denial of Service with Fork and Malloc Bombs 
Whitelisting with Gmail 
Eye Spy 
How to Social Engineer Your Local Bank 
Laptop Repair, Customer Beware 
HACKER PERSPECTIVE: Tiffany Strauchs Rad 
More Active Gamers Should Become Activist Hackers 
Simplex Locks: Illusion of Security, Version 2.0 
Hacking Is in the Blood 
Support for Cable Providers? Why? 
Pre-Texting-R-Us 
Pirating the Caribbean 
Perfect Encryption - Old Style! 
The Piracy Situation 
TRANSMISSIONS: WINTER 
Anonymity and the Internet in Canada 
Elegant Password Generation with Oplop 
Hacking the Winn-Dixie Survey 
Switch 
Fiction: Kill Switch 
LETTERS TO 2600 
2600 MEETINGS
BACK COVER PHOTO SPREAD 


Hacker Digest 27 - 2011

Cloudy Skies 
Insecurities in Emergency Rescue 
AJAX Hacking for the Discerning Pro Wrestling Fanatic 
A Little Fish in a Big Pond 
The Grey Hat Manifesto 
TELECOM INFORMER: SPRING 
No Sale for You! 
CrazyGeorge - Security Through Obscurity 
BartPE: A Portable Microsoft Windows 
Infl uential Angles 
HACKER PERSPECTIVE: Bill from RNOC 
The Hacker Enigma: Positives, Negatives and Who Knows? 
An Introduction to CSRF Attacks 
The Voyager Library Information System 
“Print Me?” Why, Thank You! 
My First Hack 
Dr. Jekyll and Mr. PayPass 
Writing a Small Port Checker in C in 40 Lines (or Less) 
Procurve Switch Hacking 
TRANSMISSIONS: SPRING 
Bluetooth Hacking Primer 
Simple How-to on Wireless and Windows Cracking, Part 2 
The Hacker Dialogue 
Hacking Google Analytics 
My Second Implant 
Free Encrypted 3G Web Access on T-Mobile Smartphones 
Why Cell May Die in a Modern Hacker’s World 
TELECOM INFORMER: SUMMER 
Call the World for Free 
How to Create Mass Hysteria on a College Campus Using Facebook 
Educational Wireless Honeypots 
I’m Not a Number 
How I Scored the Avaya PBX Init Password 
Why You Need a Grimoire 
Potential Laptop Recovery 
Hacking Boingo Wireless 
How AT&T Data Plans Work (and How to Make Them Stop Working) 
Casual Encounters of the Third Kind: A Bayesian Classifi er for Craigslist 
Outline for a Simple Darkserver and/or Darknet 
Goog411 Skype Hack 
Hacking Autodialer Telephone Access Systems 
TRANSMISSIONS: SUMMER 
Written in Spam 
Roll-your-own Automated System Restore Discs 
Grazing Voicemail Passwords 
Private Key Exchange Using Quantum Physics 
How to Overwrite JUNOS Proprietary Code 
PAYPHONE PHOTO SPREAD 
Confl ict in the Hacker World 
Read All About It! Online Security and Paid Newspaper Content 
Old School Hacking 
How I Learned to Stop Worrying and Spam the Scammers 
TELECOM INFORMER: AUTUMN 
Forgeries, Branding, and Network Theory in the Digital Playground
SPAM Simplified 
Hacking Out 
Man in the Middle Attack
HACKER PERSPECTIVE: Barrett D. Brown 
IPv6 Connection Hijacking and Scanning 
Gmail and SMS Gateway Fun 
Moving from Robotics to Artifi cial Intelligence 
Seven Things Hackers Did Right 
Life Without Walls: Circumventing Your Home Security System 
TRANSMISSIONS: AUTUMN 
How to Turn Local Admin into Domain Admin 
Panasonic Phreaking In the New Age 
Hacking and Securing the Tandberg C20 
Changing Landscapes 
Bash Bash Bash! 
How to Cheat at Foursquare 
The (Obvious?) Dangers of Free WiFi 
The Buck Stops Here: Inside AT&T’s Tier 2 Tech Support 
TELECOM INFORMER: WINTER 
Various Vulnerabilities in the UPS Shipping System 
Ode to the United States Postal Service 
Android, You Broke My Heart 
Corporate Reconnaissance for the Anti-Social 
HACKER PERSPECTIVE: John W5EME 
Anti-Satellite (ASAT) System for Dumbasses 
The Trouble with the “Digital” Music Industry 
Invisible ASCII: A Poor Person’s Steganography 
EMR Interception and the Future of Computer Hacking 
The Joy of IPv6 
Dormitory Phishing 
How to Find Information on People Using the Internet 
TRANSMISSIONS: WINTER 
Phun with FOIA 
iBahn Hotel Site Kiosks and How to Pwn One 
RAM Dumping 
Who’s Got Your Vote? 
Vulnerabilities in Quantum Computers 
LETTERS TO 2600
2600 MEETINGS - 2011
BACK COVER PHOTO SPREAD
Private Key Exchange Using Quantum Physics 
How to Overwrite JUNOS Proprietary Code 
PAYPHONE PHOTO SPREAD 
Conflict in the Hacker World
Read All About It! Online Security and Paid Newspaper Content
Old School Hacking
How I Learned to Stop Worrying and Spam the Scammers
TELECOM INFORMER: AUTUMN
Forgeries, Branding, and Network Theory in the Digital Playground
SPAM Simplified
Hacking Out 
Man in the Middle Attack 
HACKER PERSPECTIVE: Barrett D. Brown 
IPv6 Connection Hijacking and Scanning 
Gmail and SMS Gateway Fun 
Moving from Robotics to Artificial Intelligence 
Seven Things Hackers Did Right
Life Without Walls: Circumventing Your Home Security System 
TRANSMISSIONS: AUTUMN 
How to Turn Local Admin into Domain Admin 
Panasonic Phreaking In the New Age 
Hacking and Securing the Tandberg C20 
Changing Landscapes 
Bash Bash Bash! 
How to Cheat at Foursquare 
The (Obvious?) Dangers of Free WiFi 
The Buck Stops Here: Inside AT&T’s Tier 2 Tech Support 
TELECOM INFORMER: WINTER 
Various Vulnerabilities in the UPS Shipping System 
Ode to the United States Postal Service 
Android, You Broke My Heart 
Corporate Reconnaissance for the Anti-Social 
HACKER PERSPECTIVE: John W5EME 
Anti-Satellite (ASAT) System for Dumbasses 
The Trouble with the “Digital” Music Industry 
Invisible ASCII: A Poor Person’s Steganography 
EMR Interception and the Future of Computer Hacking 
The Joy of IPv6 
Dormitory Phishing 
How to Find Information on People Using the Internet 
TRANSMISSIONS: WINTER 
Phun with FOIA 
iBahn Hotel Site Kiosks and How to Pwn One 
RAM Dumping 
Who’s Got Your Vote? 
Vulnerabilities in Quantum Computers 
LETTERS TO 2600 
2600 MEETINGS - 2011
BACK COVER PHOTO SPREAD 


Hacker Digest 26 - 2010

Year 26 
ATA Security Exposed
Outsourced 
Annoying Dormitory Phones 
robots.txt Mining Script for the Lazy 
TELECOM INFORMER: SPRING 
Surfing Without a Board 
MP3s: A Covert Means of Distributing Information 
Catching an iPod Thief Using Forensic Evidence 
Inside Google Radio 
Scour: Paid to Search, Again? 
Battling the Fanuc Data Panel 
Network Neutrality Simplified 
HACKER PERSPECTIVE: Virgil Griffith 
Second Life Hacking 
Exploiting Price Matching Through Javascript Injection 
DNS Spoofing on a LAN 
An Astronomer’s Perspective on Hacking 
TRANSMISSIONS: SPRING 
Social Engineering HP for Fun and Profit 
The Last 1000 Feet 
Not The Enemy 
Regaining Privacy in a Digital World 
The Security-Conscious Uncle 
Why the “No-Fly List” is a Fraud 
TELECOM INFORMER: SUMMER 
Finding Information in the Library of Congress 
Hacking the DI-524 Interface 
Simple How-to on Wireless and Windows Cracking 
If You Can’t Stand the Heat, Hack the Computers! (Part 1) 
Security: Truth Versus Fiction 
Hacking the Beamz 
HACKER PERSPECTIVE: Jason Scott 
iTunes Stored Credit Card Vulnerability 
Zipcar’s Information Infrastructure 
The How and Why of Hacking the U.N. 
Listen to Radio Hackers! 
Abusing Metadata 
Verizon FIOS Wireless Insecurities 
TRANSMISSIONS: SUMMER 
Using Network Recon to Solve a Problem 
Suing Telemarketers for Fun and Profit 
CONTENTS AND
INGREDIENTS
PAYPHONE PHOTO SPREAD 
Hacking in Tents 
Exploiting University Students using Rogue Access Points 
Catching a Laptop Thief/WiFi Hacker 
Attacking a Blind Spot 
How to Almost Hide Your Digital Identity While Port Scanning 
TELECOM INFORMER: AUTUMN 
Hello! Google Calling 
Post-Apocalyptic Communications 
Roll Your Own Hive-Mind 
Free DirecTV on Frontier 
Free Trials - Avoid Giving Out Your Credit Card Number 
If You Can’t Stand the Heat, Hack the Computers! (Part 2) 
HACKER PERSPECTIVE: Johannes Grenzfurthner 
Granny Loves Linux! 
Cracking WPA - PSK 
Hard Disk Encryption, No Excuses 
Microsoft, Please Salt My Hash! 
How to Get Free Loans From American Express 
TRANSMISSIONS: AUTUMN 
SSL DNSSEC 
Tethering the Samsung SCH-R450 on MetroPCS 
“Borrowing” the CustomInk.com Vector Library 
Hacking Your Hospital Bed 
Smart Regression 
Pwning Past Whole Disk Encryption 
L33ching the L33chers: Using a Portable Wireless Network 
TELECOM INFORMER: WINTER 
Hacking Tor’s Control Protocol 
Hack T-Mobile Prepaid Messaging and T-Zones 
Calling Comdial Part 2 
Underground Physical Network 
Understanding Hacking Tools with Socket Programming 
HACKER PERSPECTIVE: Annalee Newitz 
Hey Adobe! Leave My Boot Loader Alone! 
Revenge is a Dish Best Served Cold 
Social Engineering from a New Perspective 
A Simple Technique for Drum ‘n’ Bass 
Retail Automation - ABS 
Connecting to streamtheworld Audio Stream Directly 
TRANSMISSIONS: WINTER 
The Importance of Hacking Your School’s Network 
FICTION: The Particle 
FICTION: Shakedown 
LETTERS TO 2600 
2600 MEETINGS - 2010
BACK COVER PHOTO SPREAD