www.2600.com
Copyright © 2600 Enterprises, Inc. All rights reserved.
Contents
2024 Spring
Ill Communication
“Trust Me, I’m a Professional.” How to Social Engineer AI to Bypass Learned Ethics
A Brief Guide to Sci-Hub
Further Password Discourse - Fundamentals
The Elephant in the Room
TELECOM INFORMER
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data
Listening to Your Computer
“HP Smart” - Or a Lie in Two Words
Overcoming Toyota USB Filesystem Limits
About DuckDuckGo’s Sources
HACKER PERSPECTIVE
Host Identification With USB Devices
The Garden of Privacy
Unglorified Look at Your Career in IT
LETTERS
EFFECTING DIGITAL FREEDOM
Reflections on Wikileaks and Snowden
Is Quantum Mechanics a Pseudoscience?
I Killed Something Awful
ARTIFICIAL INTERRUPTION
Binary Attitudes Do Not Belong in an Analog World
GendBuntu, Free Software, and Microsoft in the French Government
AI Is Not the Problem - We Are
Lee Williams, Harassment Agent Episode 1
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
2023 Spring
Progress of a Sort
Sleuthing Google Apps Part 2: The Google Application Suite
What About Tomorrow’s Hackers?
Hacker Movies
A Post-Soviet Payphone Trick
TELECOM INFORMER
Organizing Music Files With SongRec and Shazam
What Is a Hacker?
Automated Vulnerability Scanners and a False Sense of Security
A COSMORED Configuration Flaw
A Holistic Approach is Better
The Great Resignation: Faux Recruiters Social Engineering the **** Out of Applicants
HACKER PERSPECTIVE
Hacking The Lenovo 11e Chromebook
Known Plaintext Attacks Are Caesar-ous Business
American Shanzai, Part 1
LETTERS
EFFECTING DIGITAL FREEDOM
What is Futel?
The Power of Try
AI For Content Generation
Neuralink Thoughts
Quantum Computer Algorithms, Part I: Quasi-Classical Methods
ARTIFICIAL INTERRUPTION
OpenAi’s Chat-GPT3: A Manipulating PR Tool
Readme.exe
A Lifetime of Computing
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
2023 Summer
Artificial Nonsense
Programming of the Past
Science Fair and Congressional Farce
A Chain Addition Generator in AWK
Quantum Computer Algorithms, Part II: Amplitude Amplification
The Metaverse Is a Solution Looking for a Problem
Solipsism, AI, and the Future of Empathy
TELECOM INFORMER
Why I Am Not Panicked About Being Replaced by AI
Social Engineering: Quiet Nights Are Here Again
Hunting Apps for OSINT
Hacking the Hackers
Is There Anything Else I Can Assist You With?
HACKER PERSPECTIVE
Giving a Damn: Response to “A Holistic Approach is Better”
Book Review: The Future of National Intelligence
American Shanzai, Part 2
LETTERS
EFFECTING DIGITAL FREEDOM
Next Level AI: ChatGPT
Tomorrow’s Challenges: Non-Fungible Tokens
ARTIFICIAL INTERRUPTION
A Tale of Insecurity
Microsoft, Stop Reading My Emails!
The Cybiko
Turing’s Battle
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
2023 Fall
Memories to Come
Designing an OpenAI Powered IRC Chat Bot for Fun and Profit
Cute App, But I’ll Use My Own
Saying Goodbye to an Old (GPFS) Friend
TELECOM INFORMER
The Arrival of 2600 Digital Delivery
Why Aren’t You Cracking Your Users’ Passwords?
A Technology Life Story
Social Engineering is Forever
Is AI More of a Tool or an Ethical Challenge?
Quantum Proof Encryption
But I Don’t Want a Copilot
HACKER PERSPECTIVE
Diskless Malware
Hacking the Airwaves
Adventures in Zero Trust
American Shanzhai, Part 3
LETTERS
EFFECTING DIGITAL FREEDOM
Go On a Journey
Morbid Curiosity in the Weaponized AI Era
See You on the C-Drive (A Series of Late 20th Century Fragments)
ARTIFICIAL INTERRUPTION
Is 2600 Still Relevant?
Learn Linux, People!
WasteTrackers and More
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
2023 Winter
The Road Behind
The Dark Side of DNA Data
The BoneBox
Artificial Intelligence and Creativity
Career and Gloating in Las Vegas
TELECOM INFORMER
Enhance Your Typing Experience With Mechanical Keyboards
Adventures in Lockpicking
Ooops; v97.129
Geo-Distributed Bug Bounty Hunting
Being a Hacker
Byte-Sized Justice: A Tale of Hacker Ethics and Copy Protection
A Quick Intro to Biohacking
HACKER PERSPECTIVE
Privacy: Protecting Your Personal Information Online
The AI Risk Nobody Seems to Mention
American Shanzhai, Part 4
LETTERS
EFFECTING DIGITAL FREEDOM
Quantum Computer Algorithms, Part III: DES Decryption
GPT Revolution: Reimagining Programming in the Era of AI
Snitched Out by Tech
I Fight for the Users
ARTIFICIAL INTERRUPTION
Platform Capitalism Can’t Surveil Absurdism (and Worse)
Alzheimer’s and AR Tech
Book Review: Pegasus
Book Review: Fancy Bear Goes Phishing
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
2022 Spring
Renewed Hope
How to Create a Practical Burner Phone for the Average User
Exploring the BACnet Protocol for Fun and Profit
TELECOM INFORMER
How to Use Gmail to Send Emails From an SMTP Server That You Do Not Own
FOIA as Weapon
Data Analysis as the Next Step
Web 3.0 is Bullshit
Book Review: Sandworm
Why You Need to Self-Host
Should I or Shouldn’t I? Ransomware Negotiation
Social Engineering Attacks Out of Control
HACKER PERSPECTIVE
Sleuthing Google Apps Part 1: Google Calendar
I Love Smart Working
LETTERS
EFFECTING DIGITAL FREEDOM
The Phreak’s Field Guide to Identifying North American Phone Switches, Part Two
ARTIFICIAL INTERRUPTION
Has the CIA Cloud Service Become More Secure? Negative
The Author Does Not Exist
Harnessing Cryptocurrency Miners to Fight Climate Change
An Atavistic Freak Out, Episode Four
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
2022 Summer
Social Media Is Neither
Phishing in 2022
Plain Text in Plain Sight: Smaller Alternatives to the World Wide Web
Battle for Better Batteries
Command Line Unminifier
TELECOM INFORMER
The Problem of Effective and Usable Strong Passwords
Hacking Traffic Lights
I’ll Take Some Vigenère With My Caesar
Applications, Places, System: A Personal View of Linux
Dial-a-Word
HACKER PERSPECTIVE
End of the Dream
Why Exploiters Should Optimize Their Code
Hacking Into the Past
LETTERS
EFFECTING DIGITAL FREEDOM
The Dark Side of DarkMatter: The Evil Hackers Behind Project Raven
I Don’t Think I Was Supposed to See That
About Conversation, Thought, and Language
ARTIFICIAL INTERRUPTION
Brute-Forcing a Museum’s Math Puzzle With Python
Hacking and Politics: Why Talking About Both Matters
An Atavistic Freak Out, Episode Five
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
2022 Fall
The Rule of Law
A New HOPE: Release Notes
The Internet of Problems
TELECOM INFORMER
Keeping America Informed: An Introduction to Government Documents
Windows Installers
Hack Your Brain
Hacker Dilemmas
An Introduction Algorithm to Decoding an Enigma
Is It Time to Change Our Approach to Security?
Will You Let Your Car Drive Itself?
HACKER PERSPECTIVE
A Ripple Story
Hackers - What is Our Mission Statement?
How to Double-Spend a Bitcoin
LETTERS
EFFECTING DIGITAL FREEDOM
Three Rules Against Tech Exposure and Dependency
Sneakers: 30 Years of a Cult Classic
Internet Landscape in Germany
ARTIFICIAL INTERRUPTION
What's Old is New Again: PDF Malware Part Deux
What Does "Impossible" Mean?
Freedom of Speech: Terms and Conditions
People vs. Corporations
An Atavistic Freak Out, Episode Six
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
2022 Winter
mtg < 0Inconvenient Truths
You Can Use the Dark Web for Good
Degradation as DRM
We Love Trash
TELECOM INFORMER
Friendly Fraud
Let's Party Like It's 1989
Current Bulletin Board Systems: How It's Done
Intercepting Google CSE Resources
The Infosec Professional Song
HACKER PERSPECTIVE
YouTube Is Not a Safe Space
What Do You Mean You Don't Have a Responsible Disclosure Program?
The Coolest Hacker Multitool On the Market: The Flipper Zero
LETTERS
EFFECTING DIGITAL FREEDOM
Cyber Security Frameworks
Music in Ones and Zeroes: A Memory of Streaming Soundscapes
Cryptocurrency - Busted!
ARTIFICIAL INTERRUPTION
Tales for My Toddler
Raising Generation Orwell: A Guide to Teaching Kids the Human Rights of Privacy
scan.sh
The Search for Life at 300 Baud
Hey, I Paid For This Cabin
An Atavistic Freak Out, Final Episode
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
2021 Spring
Forward Thinking
Anonymity, Privacy, and Reality
What Hacking My County’s Election Worker Portal Taught Me
Ham Radio, SMS, and the ISS
Randomize Your Exit Node
TELECOM INFORMER
Logging Discord Tokens
Trojan Detection and Avoidance
5G Hotspots and Tinc
Book Review: We Have Been Harmonized: Life in China’s Surveillance State
A Layman’s Intro to Quantum Computers
HACKER PERSPECTIVE
Inside Job: Exploiting Alarm Systems and the People Who Monitor Them
Why Are We Still Having This Conversation? Embedded Systems Still Not Secure
LETTERS
EFFECTING DIGITAL FREEDOM
How Does NSA’s XKEYSCORE Project Work?
A Proposal for the Elimination of Passwords
Life Lessons Can Help You Sneak Into a Crowded Conference
AI In Dating Simulations Games
ARTIFICIAL INTERRUPTION
Hacking HP’s OfficeJet 6310
The Net As Seen in China
Picture This
Why I Am a Hacker: Hacking In the Era of COVID-19
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
2021 Summer
What is Truth?
More Privacy and Better Security Through Email Diversification
Three Fundamental Questions
TELECOM INFORMER
Fluc Google’s FLoC
Municipalities Pwned at Greater Rates!
The Demise of Network Security
Who’s Training Whom?
Hacking Motion Capture Software and Hardware
How to Read 2600 Magazine
Verified Badges for Everyone?
Gone Fishin’
HACKER PERSPECTIVE
Vulnerabilities in Deep Artificial Neural Networks
The Telegraph Regulations and Email
Facebook and the FBI
LETTERS
EFFECTING DIGITAL FREEDOM
When 5G Technology and Disinformation Collide
How to Hack the American Mailz
“Post-Quantum Cryptography” Is Not Going to Work
Book Review: RESET: Reclaiming the Internet for Civil Society
Book Review: Rabbits
ARTIFICIAL INTERRUPTION
How To Create Your Own Privacy-Enabled Sunglasses
A File Format to Aid in Security Vulnerability Disclosure
“Hello fellow sentient being,”
An Atavistic Freak Out, Episode One
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
2021 Fall
FREE VIRGILAmplification Gone Wrong
Wherever You Go, There You Are
Using “DeepChecksum” to Ensure the Integrity of Backups
I Thought the Cyberpunk Dystopia Would Be a Hacker Paradise
Where Have All the Tor Sites Gone?
TELECOM INFORMER
The FBI Communications Breach of 2010: Applications and Perspectives
Book Review: Press Reset: Ruin and Recovery in the Video Game Industry
The Phreak’s Field Guide to Identifying North American Phone Switches, Part One
Empty Houses
The Art of the Troll
HACKER PERSPECTIVE
Exploring Old MS Paint Formats
Keyspace Iterator in AWK
LETTERS
EFFECTING DIGITAL FREEDOM
Hacking NYC MTA Kiosks
What’s With This Username Stuff, Anyhow?
The Matrix Is Real: How to Hack Humans for Fun and Profit
ARTIFICIAL INTERRUPTION
Why TikTok Activism Made Actual Hacktivism Harder
Reply to: “Normalizing SASsy Data Using Log Transformations”
Thoughts on “Verified Badges for Everyone?”
The Lost Art of Windows 9x Pranking
An Atavistic Freak Out, Episode Two
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
2021 Winter
The Hacker Curse
L-Band: Frequencies and Equipment You Need to Know About
In the Trenches: Working as a Security Analyst
How to Hack a Router Device Like NSA Employees
Bitcoin: The Major Difference
TELECOM INFORMER
Privacy Matters
Inside the New World of Cryptocurrency Phishing
Firewall Netcat
Hacking the Medical Industry
Putting Events on Twitter With the Help of Emojis
The Solution to the Technological Singularity
HACKER PERSPECTIVE
leet.c
Making Boring Work Great Again
LETTERS
EFFECTING DIGITAL FREEDOM
Hacking Dark Souls II
Tenth Grade Social Engineering Project
When One Door Closes
Supply and Demand, Apollo 11, and GitHub
ARTIFICIAL INTERRUPTION
Hacking and Knowing - Some Thoughts on Masking Threshold
Book Review: I Have Nothing to Hide
Keeping Busy When Retired - It’s Important
An Atavistic Freak Out, Episode Three
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
2020 Spring
The New Social Disease
Cracking Your Neighbor's Wi-Fi for $180
Hax0rz? Sniffing My Critical Infrastructure?! It's More Likely Than You Think!
Null-Routing Facebook: Using Small Tech to Fight Big Tech
TELECOM INFORMER
Hackerspace School
Learning Programming Through Hacking AOL
Has Your Password Been Pwned?
Antique Malware Can Still Bite You
Thoughts From a Newcomer
Why Is the DoD on My APN?
HACKER PERSPECTIVE
Finding Email Addresses
More Advanced Processors, Greater Privacy Intrusions
Printers: The Overlooked Security Concerns
LETTERS
EFFECTING DIGITAL FREEDOM
The USPS Informed Delivery Service as a Phishing Data Source
Yahoo Groups and the Legacy of Internet Content
The Freephones of Whidbey Telecom
Point of Sale Shenanigans: Authorized Unauthorized Transactions
CITIZEN ENGINEER
Electric Barons
Would You Like Some Pancakes With That Breach?
An Introduction to Chaff - an Anti-Forensics Method
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
2020 Summer
Adaptation
Skimming Credit Card and ACH Payment Details from Tigerpaw Software Clients
The Pipe Dream of Sensible School Internet Policy
Windows Subsystem for Linux. A n00b5 Toy?
TELECOM INFORMER
Towards a Secure Telephone Network
Ghosting an Operating System for Privacy
Tracking Wi-Fi Devices with Python and GPS
HACKER PERSPECTIVE
Industrial Control Systems and Cybersecurity
Bad ISP OpSec
Anonymous Temporary Storage and Retrieval
How to Become a Hacker in 24 Hours
Thinking in AI
LETTERS
EFFECTING DIGITAL FREEDOM
Fun with Text to Speech
Hacker Email
Cerebral Spill
OhNoDaddy: GoDaddy Compromised
Book Review: The History of the Future
ARTIFICIAL INTERRUPTION
The Rise of the Machines - Learning to Detect DGAs
Responsible Disclosure of a Malware Infiltration Attempt
Fiction: Hacking the Naked Princess 0x19
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
2020 Fall
The Blame Game
Smile, You're On Camera
Cyber-Pandemic: The World in Ruins
Understanding Election Security Through the Lens of the Hierarchy of Voter Needs
HOPE 2020 Fulfilled - Debrief Overview
TELECOM INFORMER
Hacking Rotary Dials
QR Chaos
Knowing What To Search For
HACKER PERSPECTIVE
Clean Rooms and Reverse Engineering
Searching Government Quiz Sites for Hidden Answers
Taking Control of Your Devices
LETTERS
EFFECTING DIGITAL FREEDOM
The NSRL For Hackers
Make Viri Great Again
ARTIFICIAL INTERRUPTION
What's Old Is New Again - We Are Still Jackpotting ATMs
Facebook's Efforts Against Ad Blocking
Red Light Robin Hood
The Elements of a Raven Matrix
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
2020 Winter
Errors in Freedom
The TikTok Spyware Conspiracy
Hacking Digital Signage Screens
TELECOM INFORMER
How To Write Malware in PowerShell - Tips and Tricks
Beyond the Breach: An In-Depth Look into the Cyberinsurance Industry
Right To Be Forgotten - Network and Home
What Three Words, and Your 2600 Meeting
HACKER PERSPECTIVE
The Brazilian Phone System Revisited
Hacking the Game Rules
Book Review: If Then: How the Simulmatics Corporation Invented the Future
LETTERS
EFFECTING DIGITAL FREEDOM
Hosting Under Duress
How One "S" Can Make a Difference
COVID-19: A Tale of Two Mindsets
Normalizing SASsy Data Using Log Transformations
ARTIFICIAL INTERRUPTION
Work From Home Through P2P Network
Chromebook as a Web Hacking Platform
Thinking in AI - Can AI Wake Up?
Thoughts on Bitcoin
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
Spring 2019
Preserving the Future
Reverse Engineering Android Apps
Android Smartphone Secret Codes: Revealed
How to Make Your eBooks Inheritable
TELECOM INFORMER
Web Scraping Scripts
Performing a MacGyver to Call Anyplace Home
Blast Accusations for Cybersecurity Intel
HACKER PERSPECTIVE
Be a Good BitTorrent Citizen
A Guide to ALKEMI
LETTERS
EFFECTING DIGITAL FREEDOM
Second-Generation Quantum Computers
In-Browser Cryptojacking: An Old Threat in a New Guise
So You Want to Be a Coder
CITIZEN ENGINEER
Lights Out! Guerilla Radio
Why You Should Always Give out Your Telephone Number
with the Area Code
We Just Called Them Dialers
Book Review: Weapons of Math Destruction
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
Summer 2019
Convictions
Porting IoT Malware to Windows
There Is No Magic in the Clouds
TELECOM INFORMER
Dank Kush or Fleet Vehicles?
How to Defeat Intelligence Tests
Connecting to the Internet for Free Using Iodine
Book Review: Broad Band: The Untold Story of the
Women Who Made the Internet
We Will Rock You
HACKER PERSPECTIVE
The Hacker Mindset or How We Can Move the World
Let's Just Call It BitCon
The Madness Debate (or How I Got Locked out of My Computer)
LETTERS
EFFECTING DIGITAL FREEDOM
Mechanical Keyboards
The Multiple Persona Theory of Digital Secrecy
Mini Mate - Rescuing Hardware from the Graveyard
CITIZEN ENGINEER
Get Those Digits
Potential VPN Attacks
Working for an ISP
Fiction: Hacking the Naked Princess 0x17
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
Autumn 2019
Our Audacity
Fully Homomorphic Encryption and Privacy
Who Is Watching Us?
TELECOM INFORMER
The Mysteries of the Hidden Internet
Breaking DirecTV’s DVR Authentication
Machine Rhapsody in 2099
Introduction to Computer Viruses,
Example in Windows Powershell
All You Need is... Air
HACKER PERSPECTIVE
Twitter the Enemy
Student Privacy by Practice - Not by Policy
Online Thrift Stores Have Your Data
LETTERS
EFFECTING DIGITAL FREEDOM
Active Defenses for Industrial Espionage
The Infocalypse
Book Review: The Big Nine:
Tech Titans and Their Thinking Machines
Book Review: A People’s History of
Computing in the United States
CITIZEN ENGINEER
The Case Against Certified Ethical Hacking
Thoughts on Account Enumeration
Arduino-Based Burglary Zone Input Tester
“Information is Neutral” and Other Social Myths
HACKER HAPPENINGS
MARKETPLACE
MEETINGS
Winter 2019
From the Ashes 4From the Ashes
Industrial Control with Modbus
Ideas Behind Site Reliability Engineering
Cyberspelunking
TELECOM INFORMER
Steganographic Filesystems
Death of a Scene
Body Key-Logging
HACKER PERSPECTIVE
Rehabilitation Center
(Attacker's) Mission Complete
How to Get Free Wi-Fi Anywhere
What is Hacking?
LETTERS
EFFECTING DIGITAL FREEDOM
Maximizing Privacy in a Digital World
Do-It-Yourself Cloudflare on a Budget
Book Review: Artificial Intelligence: A Very Short Introduction 51A Very Short Introduction
CITIZEN ENGINEER
Reflections on Hackers
Pass the Cookie and Pivot to the Clouds
Fiction: Hacking the Naked Princess 0x18
HACKER HAPPENINGS
MARKETPLACE
Student Privacy by Practice - Not by Policy
MEETINGS
Hacker Digest 35 - 2018
Embracing Empowerment
The Secrecy and Security of the Special Counsel
What Programming Language Should I Learn? Why Not All of Them?
Breaking Standards
TELECOM INFORMER
How to Run an I2P Hidden Service
Bitcoin or Bit Con? One Newbie’s Adventures in Cryptoland
The Case of the Murderous AI
In Defense of the Net
HACKER PERSPECTIVE
A Review of CopperheadOS
SSH Keys and Challenges in Enterprise Environments
Unlocking the Secret of Keys
EFFECTING DIGITAL FREEDOM
Hacking Our Attitudes (The Key to Being a Better Attitude Trumper)
Historic Hacking
CITIZEN ENGINEER
Bluetooth Hacking 101
Hidden ISPs
Extrapolating Phone Numbers Using Facebook and PayPal
The Free Flow of Information
Celebrate the Difference
A N00b’s Guide to the Dark Web
The IPv6 Delusion
TELECOM INFORMER
How to Be a Guitar Hero, IRL
Even Restaurants Need InfoSec
Serial Number Cracking For Fun and Profit
Automating a Police State
HACKER PERSPECTIVE
Brute Forcing a Car Door with Math
Hack(ed), the Earth
EFFECTING DIGITAL FREEDOM
A Hacker Adventure in Urban Exploration
Beyond the Scare-Mongering
CITIZEN ENGINEER
Re-Purposing Old Technology and Ideas for Fun and Emotional Profit
Hacking: Quick and Easy
Thoughts On Cryptocurrency
Fiction: Hacking the Naked Princess 0x15
PAYPHONE PHOTO SPREAD
Injustice for All
Digital Sanctuary Cities
Removing eBook DRM without OCR or GUIs
Communiques, Procedures,
Decrees, Specifics
THE HACKER DIGEST - VOLUME 35A Carrier Pigeon Revisited
The Evolution of Ran$omware
TELECOM INFORMER
Hackers to the Rescue! (Maybe)
Book Review: The Art of Invisibility
GDPR – Active Empowerment vs. Passive Consumerism
A Characteristic Study of IoT Botnets: Understanding the Design and Behavior
HACKER PERSPECTIVE
Ms. Reality Winner is an American Dissident
More Ways to View Hacking
EFFECTING DIGITAL FREEDOM
Totalitarian Control: How We Used PowerShell to Manipulate User Behavior
What Do Lawyers and Hackers Have in Common?
No Country for Incarcerated Hackers
CITIZEN ENGINEER 1
Bypassing Email Anti-Spam Filters
Hacker History: MDT or “The Mass Depopulation Trio”
Testing Your l337 h4x0r skillz Safely and Legally
Gone Phishin’
Taking Back Ownership
1979 Plus 40 Years
AV1: One Giant Leap for Video-Kind
YITM
Social Engineering from Prison
A Brief Tunneling Tutorial
TELECOM INFORMER
Quantum Computers and Privacy
Hacking the School System
A Reading of the AI Hype Meter
HACKER PERSPECTIVE
Thumbcache.db Primer
Sorting It All Out:
The Long Lost Bastard Children of the United States Postal Service
Configuration Negligence: Who is Responsible?
EFFECTING DIGITAL FREEDOM
Facts About Honesty/Integrity Tests and Interviews
Book Review: Surveillance Valley: The Secret Military History of the Internet
Book Review: Ten Arguments for Deleting Your Social Media Accounts Right Now
Modem and Me: The Loose Ends
CITIZEN ENGINEER
A Fork() in the Road
Making an Informed Business Decision Using Public Financial Records
To the Unknown Hacker
Hacking in a Slow Job Market
Fiction: Hacking the Naked Princess 0x16
LETTERS TO 2600
2600 MEETINGS 2018
BACK COVER PHOTO SPREAD
Hacker Digest 34 - 2017
A Price for Truth
New U.K. Surveillance Laws - Time to Get Serious About Security
Voices in the Sky: Satellite Communication Methods
Lockbox PIN Code Generator
A Lock with the Key Next to It
Hacking Free Wi-Fi on Delta Flights
TELECOM INFORMER - SPRING
Telephones from Space
Longing for the Past
Getting Inspired as a Student
Google Auto-Fill Suggestions, Politics, and Magic
The Inner Circle... Part One
HACKER PERSPECTIVE - SPRING
Software Cracking with dotPeek
Ignore Your .env - Browsing Environment Files on GitHub
Obfuscating Torrent Traffic
Successful Network Attacks - Phase Two
White House Phone Numbers
How to Improve Zone Protection in Burglary Alarms
EFFECTING DIGITAL FREEDOM - SPRING
Validating Software Validation
Thoughts on Phoenix Project II
Those Coca Cola Freestyle Machines in Crew Mode
321 Studios Revisited
The Power of the Press
The Censorship Resistant Internet: How to Run a Tor Hidden Service
Converting the Voter Database and Facebook into a Google for Criminals
Hactivism to End Human Trafficking and Modern Day Slavery
TELECOM INFORMER - SUMMER
How Rogue One Taught Me Not to Be a Bad Guy
A Declaration of Independence for Cyberspace
Demonsaw: Bypassing Anonymity Utilizing Social Engineering
Creating an Automated Open Wi-Fi Traffic Capturing Tool for Under $20
0x8bc4 Before You 0xffe0
HACKER PERSPECTIVE - SUMMER
My Perspective
OPTingOUT
Analog vs. Digital Living: Real Solutions to Absolute Anonymity and Privacy
EFFECTING DIGITAL FREEDOM - SUMMER
Building a Better Screen Locker for GNU/Linux
CITIZEN ENGINEER - SUMMER
VR Trumpers
Successful Network Attacks - Phase Three
Advice from the Socially Engineered
Chemicals, Ensemble, Peaceful
Assembly, Transmission
Internet Thoughts
Fiction: Hacking the Naked Princess 0x13
PAYPHONE PHOTO SPREAD
Acts of Courage
Bypass Your ISP’s DNS and Run A Private OpenNIC Server
PHP Backdoors
Inseparable: The Intersectionality of Hacking and Politics
TELECOM INFORMER - AUTUMN
Enhancing SQL Injection With Stored Procedures
How to Get Nearly Free Travel from Scotrail
(learn (LISP))
Reverse Engineering Electronic Letter and Number Toys
How to Hack Your Way to a Guilt-Free, Political Ideology
The Problem with IT Certifications and the Devaluation of Technology
HACKER PERSPECTIVE - AUTUMN
A Little Brother’s Manifesto
A Test Harness for Fuzzing Font Parsing Engines in Web Browsers
EFFECTING DIGITAL FREEDOM - AUTUMN
Confessions of a (for Now Not So Successful) Bug Bounty Hunter
To Care or Not to Care
Scrape Textbooks, Save Money
googlecomp.py: The Complete Google Autocomplete Script
CITIZEN ENGINEER - AUTUMN
Obfuscating Biopolitics: A Theoretical Primer for Cyborgs and Others
Debt Journey
Successful Network Attacks - Phase Four
Splatter
Credit Denial
Using dnscat2 for Encrypted C&C over DNS
Educating Friends and Family About Online Security
Creating Strong and Easy to Remember Passwords
Don’t You Have a Smart Watch Yet?
TELECOM INFORMER - WINTER
What Happens When WHOIS Data Is Made Public
Deauthing the Neighbors, or Ring Theory
Nightmare on E Street (Modem and Me Against the World)
HACKER PERSPECTIVE - WINTER
Quantum Computers and Bitcoin
I Want to Be a Hacker....
EFFECTING DIGITAL FREEDOM - WINTER
Conventionalist Theory of Reference in Comparison to Programming Language
Down and Out in a Land of Script Kiddies
Dispelling a Breach Rumor
CITIZEN ENGINEER - WINTER
The Russian Hacking Diatribe, and Why It Is Complete Agitprop Nonsense
Successful Network Attacks - Phase Five
Fiction: Hacking the Naked Princess 0x14
LETTERS TO 2600
2600 MEETINGS 2017
BACK COVER PHOTO SPREAD
Hacker Digest 33 - 2017
The Powers That Want to Be
Scraping for Cache, or It’s Not Piracy If You Left It Out in the Open
Hacking Using Parse Database Injection
Hardware Hacking - Protecting Dev’ Board I/O by Hacking an Alarm Panel
TELECOM INFORMER: SPRING
My President Twitter Bot Experiment
Defense Against the Black Arts of Forensics
A Plan 9 Primer
Chesslin
Exploiting HTML - Making Your Browser a Vegetable
Exif Location Recon with Python
HACKER PERSPECTIVE: SPRING
Eleventh Graders and Nuclear Bombs
Which Do We Prefer: Neanderthals or Hackers?
One Little Pig
Password and Mobility Security: Something Needs to Be Done
Another Solution to the USBKill.py Problem
Software Validation
EFFECTING DIGITAL FREEDOM: SPRING
Reconnaissance at Spa World
My Local Weather Observations
Fiction: The Bee in Van Pelt Park
Politics Comes Calling
Pre-Surveillance of Law Enforcement Using Targeted Advertising
Abandoned Routers: Forgotten, But Not Gone
Card Transactions Explained
To Hack an Uber
TELECOM INFORMER: SUMMER
Hacking Malaysian Routers
Nigrum Libro Interceptis: Secundae
$35 Hacking Machine
Accidentally Logging In As Admin
HACKER PERSPECTIVE: SUMMER
Gaming Ingress
Learning Hacking via MinecraftEdu
Typing Fractions in Emails and Text Files
Surfing the Web Safely and Anonymously with Whonix
How I Socially Engineered a Job
Why We Need Privacy Rights
EFFECTING DIGITAL FREEDOM: SUMMER
Dictation & Crossfire
“crossfire” by MICHAEL BROWN is licensed under CC BY 2.0
Free Windows
The Top Ten Reasons Why Hackers Should Get a Ham Radio License
Fiction: Hacking the Naked Princess 0x10-0x11
PAYPHONE PHOTO SPREAD
Promises
Hacking for Knowledge
MOV Before You JMP
It’s Security, Stupid
Freedom of Thought
TELECOM INFORMER: AUTUMN
A Captive Portal Puzzle at Sea
Spyware Techniques
Building DIY Community Mesh Networks
Musical Monstrosities
HACKER PERSPECTIVE: AUTUMN
The PirateBox
How to Google Bomb Someone
Verizon’s HOPE Scam
The Easiest Way to Break Into a Bank
Hacking Amazon E-Books with Spy Style
EFFECTING DIGITAL FREEDOM: AUTUMN
A Parallel President on Twitter
Dark Bubbles
Rescuing Fake Memory Devices
Having Fun with In-Store Chromecast
The Coca-Cola Blacklist
Bypassing Privileges with Oracle Database Express Edition 11g Release 2
TELECOM INFORMER: WINTER
Using Discord Servers to HTTP Flood
Successful Network Attacks - Phase One
Spying Across Borders in the Age of Email
InfoSec at Its Worst, OPSEC at Its Best
HACKER PERSPECTIVE: WINTER
Can Security Be Built into Pure Data?
mcquery.js - a Web Scraper for Disc Golf Players
KBChat - Private, Encrypted Chat via KBFS
2600 Leak Department
Memory Lane
EFFECTING DIGITAL FREEDOM: WINTER
Rotten Apples: OS X 101
Automatic Contest Winning via Selenium
The One About That File Server
Fiction: Hacking the Naked Princess 0x12
LETTERS TO 2600
2600 MEETINGS 2016
BACK COVER PHOTO SPREAD
Hacker Digest 32 - 2016
Nous Défions Tout
So, You Want to Be a Darknet Drug Lord....
Out of the Box Survival - A Guide to PowerShell Basics
TELECOM INFORMER: SPRING
Brazil’s Electronic Voting Booth
Evolution of a Hack
Bleeper - Downloading Full-length Preview MP3s from bleep.com
The Enterprise, the Subverted PKI Trust Relationship, and You
HACKER PERSPECTIVE: SPRING
WYSE Moves
Office Talk or Social Engineering?
Archiving ComiXology
McAfee Family Protection - Epic Fail!
Abusing the Past
Hacking the HandLink Gateway
EFFECTING DIGITAL FREEDOM: SPRING
Ohio Prison IT Security from the Inside
Hacking For Knowledge
Linux Containers for Event Training
Are Smart Meters the End-All?
Old and New Together
I Tapped That... Tapping a Nationwide Telecommunications Network
Use Your 3D-Capable TV to View 3D Stills of Your Own Making
A Phone Story
TELECOM INFORMER: SUMMER
Chiron and Me: Hacking Astronomy
Nigrum Libro Interceptis
HACKER PERSPECTIVE: SUMMER
Library Security
Decoding a Carrier Pigeon
Attitude Adjustment: How to Keep Your Job
Out of the Box Survival, Part Two
EFFECTING DIGITAL FREEDOM: SUMMER
Coding as a Foundational Skill
A Plea for Simplicity
Ransomware: Still Active and Looking for Victims/Volunteers
Fiction: Hacking the Naked Princess 0xD-0xE
PAYPHONE PHOTO SPREAD
The Hacker Image
A Primer on Home Automation (and How Easy It Can Be)
Dangerous Clouds
Unexpected Denial Of Service
A Convenient Method for Cloud Storage with Preserved Privacy
TELECOM INFORMER: AUTUMN
Ashley Madison Military Sites
The Technology at QPDC
Open Source Repository Abuse
My Voice Is My Key
HACKER PERSPECTIVE: AUTUMN
Fun with Billing Forms and International Debit Cards
Going Nuclear - A Tale of Revenge
LEAKED DOCUMENTS
Malware Attacks - Leave Those [Banks] Alone
Mr. Robot - A Ray of Light in a Very Dark World
Cruising the Wideband Spectrum
EFFECTING DIGITAL FREEDOM: AUTUMN
The Dawn of the Crypto Age
Account Hack: Anyone Can Be a Victim
Fiction: The Stars Are Tomorrow
The New Normal
The Best Way to Share a Treasure Map
USBkill - A Program for the Very Paranoid Computer User
Circumventing Chrome and Firefox’s Third Party Cookie Block
TELECOM INFORMER: WINTER
Pushing the Limits
Romeo Tango Oscar
Yull Encryption
A Brief Cryptanalysis of Yull
HACKER PERSPECTIVE: WINTER
How to Get Free Gogo In-Flight Internet Access
Accessing Admin Privileges: A Quest Through One of Mac’s Backdoors
Perspectives on Cyber Security
The Splotchgate Saga
Hackerspaces: A Definition
You Gotta Learn From This, Kid
The Limits of Open Source Hardware
EFFECTING DIGITAL FREEDOM: WINTER
Rewriting History
The Herculean Task of Making a Documentary on the History of Hacking
Fiction: Hacking the Naked Princess 0xF
LETTERS TO 2600
2600 MEETINGS 2015
BACK COVER PHOTO SPREAD
Hacker Digest 31 - 2015
Thirty Years On
Lessons from “Secret” History
Google’s Two-Factor Authentication: The Sneaky Trust Feature
Identity and Encryption Verification
Asterisk: The Busy Box
Using Square to Obtain Dollars at a Reasonable Rate
TELECOM INFORMER: SPRING
Robbing the Rich Using Bitcoin
The Night the ATM Went Down on Me
Android Reversing Bootcamp
Hacking Commercial Maytag Washers and Dryers
HACKER PERSPECTIVE: SPRING
Accessing Data Structures in a Randomized Address Space
A Little Excitement Never Hurt Anybody!
Brute-forcing PIN Code Keypads Using Combinatorial Mathematics
Building a Community Forum
Why IMDb Got a Captcha
At Home Malware (and Online Ads) Protection
Automated Target Acquisition
Fiction: Lock and Key
Watching the Watchers
Sabotage The System: Encryption as Surveillance State Monkey Wrench
Crossover: Where Metal and Hacking Met and Mixed
TELECOM INFORMER: SUMMER
Fun With the Minuteman III Weapon System – Part Three
Fun with Data Entropy Attacks
Network Condom
Yippie Ki-Yay: Social Engineering and Film
Hack Your House
Corporate Security and Chinese Hacking
HACKER PERSPECTIVE: SUMMER
Experiences of a Hobo Security Consultant
“My Precious...” (Apple)
Hacking the SanDisk Connect Wireless Media Drive
Toilet Hacking
“Good Afternoon. This is Your Fake AV Calling.”
Future Visions
Closing the Schism Between Hackers and the Law
Fiction: Hacking the Naked Princess 10
PAYPHONE PHOTO SPREAD
A Tale of Many Hackers
The Demoscene - Code, Graphics, and Music Hacking
Bugging a Room with an IP Phone
TELECOM INFORMER: AUTUMN
Hack the Track: Put Your Money Where Your 0wn Is!
Linux Pwned - Just Not By Me
Writing Buffer Overflows for Non-Programmers
Remailing with USPS
Forensic Bioinformatics Hacks
HACKER PERSPECTIVE: AUTUMN
Spam: Where Does It Come From?
Checkmate or How I Bypassed Your Security System
Installing Debian on a Macbook Pro without rEFInd or Virtual Machines
Film Review: Die Gstettensaga: A Call to Class Consciousness for Hackers
Xfinite Absurdity: True Confessions of a Former Comcast Tech Support Agent
EFFECTING DIGITAL FREEDOM: AUTUMN
Covert War-Driving with WiGLE
Quantum Computers for Code Breaking
InfoSec and the Electrical Grid: They Go Together Like Peas and Carrots
Tools for a New Future
Password Cracking in the Modern Age
What Do Ordinary People Think a Hacker Is?
Security Behavior
TELECOM INFORMER: WINTER
Format De-Shifting
Simplocker Gonna Get’cha
Home Depot Hacks
Leeching Music From YouTube For Fun, Learning, and Profit
Recon on Disney’s Magic Band
How Portable Can Wi-Fi Get?
HACKER PERSPECTIVE: WINTER
The Surveillance Kings: Who’s Really Behind Who’s Watching Us
Taking Your Work Home After Work
The Perils of Lackadaisical Updates
Crypto Systems Which Resist Quantum Computers
The 21st Century Hacker Manifesto
EFFECTING DIGITAL FREEDOM: WINTER
Are You the Consumer, or the Product?
Generating Phone Numbers
Hacking Dudley
Fiction: Hacking the Naked Princess 0xB-0xC
LETTERS TO 2600
2600 MEETINGS 2014
BACK COVER PHOTO SPREAD
Hacker Digest 30 - 2014
A Lost Promise
Guest Networks: Protection Less Than WEP?
Practical Cryptanalysis
Twitter For Fun and Profit
Warning for Ye Olde Bank: Don’t Do This!
TELECOM INFORMER: SPRING
Social Engineering: Tactics for Prevention
Extra-Legal Harassment
HACKER PERSPECTIVE: SPRING
Book Review: Exploding the Phone
Fiddler - Never Trust the Client
U.S. Department Of State Loves Mexico
Hypercapitalism and Its Discontents
Fun with Base Math
Cracking Push-Button Locks
Brute Force Access
The Usage of the Assumption Technique in Social Engineering
TRANSMISSIONS: SPRING
Dev’ing an OS
Learning, Hacking, and the Raspberry Pi
The Road to Safety
Splunking the Google Dork
Fun with the Minuteman III Weapon System
My First Blackhat
How to Create and Operate a Temporary Free Autonomous Zone
TELECOM INFORMER: SUMMER
A Broad Spectrum of DRM
Getting Free Media - All Without Torrents!
A Beginner’s Guide to Social Engineering
Why Your Grandparents Don’t Like the Internet
What Made Unix Great and Why the Desktop is In Such Bad Shape
HACKER PERSPECTIVE: SUMMER
0-Day Adventures
How a Prehistoric Hacker Got Started
The Weather Outside is Frightful/Bulls-Eye on the Banks - Again
Exploiting the Postal Service Address System for Personal Gain
A World without Security
Book Review: Pirate Cinema
Cyber Attacks on Equities Markets
Static Code Analysis Using Watchtower
TRANSMISSIONS: SUMMER
Tracking Users on Trustworthy Sources
A Response to “Perfect Encryption - Old Style!”
Fiction: Hacking the Naked Princess 6
PAYPHONE PHOTO SPREAD
The Right to Know
An Introduction to Bitcoin
Bitcoin: The Hacker Currency?
Inquiring Minds = Hacker = Design Engineer
Hacking The Apple Collective
Internet Trolls
TELECOM INFORMER: AUTUMN
Controlling the Information Your Android Apps Send Home
U-verse Networking
Scamming the Scammer: A Fun Way to Respond to a 419 Scam
The Art of War and What IT Professionals Can Learn from It
Access Tandem Codes and the Hidden Phone Network
HACKER PERSPECTIVE: AUTUMN
Palo Alto NGFW Insider
Identity Management and Its Role in Security Strategy of Enterprise Environments
Defeating Forensic Attacks on Full Disk Encryption
Bank Notes
TRANSMISSIONS: AUTUMN
Relax, We Bought Security
Clouds, Clouds, Clouds...
Lights, Camera, Hack!
Fiction: The Error
Dissent or Descent
ID3 Tag Messages
Privacy - A New Hope Through Tails
Fun with the Minuteman III Weapon System - Part Two
TELECOM INFORMER: WINTER
The Many Vulnerabilities of Verity Parental Control
Anonymity and You, Firefox 17 Edition
Wi-Fi Security: Attack and Defense
The Maturation Cycle of a Hacker/There is Never a Free Lunch
HACKER PERSPECTIVE: WINTER
CYA Using a Pi to Pivot
Pretty Good Privacy
Hacking Your Mother Tongue to Obfuscate your Encryption
The Growing Schism Between Hackers and the Law
Netcam: Basics and Vulnerabilities
TRANSMISSIONS: WINTER
All I Want is Total Freedom
Fiction: Hacking the Naked Princess 7-9
LETTERS TO 2600
2600 MEETINGS 2013
BACK COVER PHOTO SPREAD
Hacker Digest 29 - 2013
Game Changing
A PHP Rootkit Case Study
Denial of Service 2.0
Spoofing MAC Addresses on Windows
GroupMe: A Modern Approach to Social Engineering
TELECOM INFORMER: SPRING
Curiosity Killed the Cat
Stupid 9-Volt Tricks
So... I Bought a Chromebook
Hacking Giveaway of the Day (GOTD)
How to Avoid the Online Dating Scam
RTF...TOS
Domain and Security
HACKER PERSPECTIVE: SPRING
Towards a Hacker Friendly Mobile World
LinuxLive... Save Me
The Major Flaw of Pentesting
Free Music: The Quest for the MP3
An EMP Flash - It All Stops
Learning from Stratfor: Extracting a Salt from an MD5 Hash
TRANSMISSIONS: SPRING
Control4 and Home Automation
Backdooring with Metasploit
My Grandpa's Books Never More!
Insurgent Technology: In WikiLeaks’ Wake
The Pros and Cons of Courses
Scales of Inequality
Bluetooth Hunter's Guide
Security by Obscurity = Insecurity
Building a Cat-5 Cable Tap
NGFW - Not Grandpa’s Firewall
TELECOM INFORMER: SUMMER
A Counterpoint to “The Piracy Situation”
The Piracy Situation: The Devil’s Advocate
Why is Piracy Still Allowed?
The New Age of the Mind
Building the Better Brute Force Algorithm
HACKER PERSPECTIVE: SUMMER
Firewall Your iPhone
Memoir of a Tech Writer: The Art of Leverage
Say It Ain’t So Verizon
Hacking Climate Change With WeatherLink
Baofeng UV-3R: The Cheapest Dual-Band Ham Radio HT
TRANSMISSIONS: SUMMER
Metaphasic Denial of Service Attacks
Never Be ON TIME Again!
PAYPHONE PHOTO SPREAD
The Eyes Have It
Technology at the Federal Bureau of Prisons
Using Bluetooth Devices as an Additional Security Measure in Linux
Hackers Indispensable for Volunteer Groups
TELECOM INFORMER: AUTUMN
The Quadcopter Crash Course
Spear Phishing at a Bank - A Hard Lesson Learned
Restoring Honest Elections
Hackers In Space
Hacking Apple’s System
Fundamental Flaws in Online and Phone Ordering
HACKER PERSPECTIVE: AUTUMN
Beware the Cyber Weapons Industrial Complex
XML Automated Gambling
Stuxnet: An Analysis
How to Leech from Spotify
TRANSMISSIONS: AUTUMN
Radio Redux
Physical Security Threat from Hotel WiFI
A Nice, Hot, Socially Engineered Meal
Storm Clouds
Basic Code Breaking
An Overview of the Security Benefits Offered by Desktop Virtualization
Hardware Hacking - An Introduction Via Dev’ Boards
Hacking Walgreens Photo Processing Machines
TELECOM INFORMER: WINTER
C is for Camouflage
A Method to Spider Sites with Teleport Pro
Steganography over Covert Channels
New Ways of Ranking Documents
Hacking Dirt
HACKER PERSPECTIVE: WINTER
The Security Funnel: When OpenVPN Meets Tor
Tactical Teensy Rapid Recon
Alternate Method for Creating an SSH Tunnel with PuTTY and Squid
How to Survive a DNS Attack
The Breach That Wasn’t
TRANSMISSIONS: WINTER
Wordpress Exploit Immunization
Fiction: Hacking the Naked Princess 1-5
LETTERS TO 2600
2600 MEETINGS - 2012
BACK COVER PHOTO SPREAD
Hacker Digest 28 - 2012
A World Spinning
Password (In)Security?
Password Bypassing and Clearing
How Good is Geolocation?
TELECOM INFORMER: SPRING
Why I Like E-books
What is a Hacker?
Who is Anonymous or How to Troll the Media for Fun and Profit
How to Accept Payments Anonymously - A Digital Currency Guide
How to Find Out What the Government Knows About You
Bypassing JavaScript Timers or How I Learned to Stop Waiting and Love the Variable
Remote Login Made Easy
Two Party Covert Communication over MSN Messenger System using Emoticons
Virtual Anti-Forensics
HACKER PERSPECTIVE: Katherine Cook
Secrets of the Spider
The Lessons Learned on a Training Site
Writing Bots for Modern Websites
Where Have All Our Secrets Gone?
LDAP Directory Servers: TMI!
Computers: With and Without
Automatic Usage of Free Wi-Fi
TRANSMISSIONS: SPRING
Coding Bots and Hacking WordPress
Abusing The Cloud
Progress Report
Dealing with Credit Card Companies
Detecting and Tracking Stealth Satellites
Pen Testing from a Mile Away
Securing Online Voting
TELECOM INFORMER: SUMMER
Mobile Hacking with Android
How I Escaped Google
Add a User With Root Privileges Non-Interactively
Simple RSA Encryption
Booze, Nosiness, and City Terminals
HACKER PERSPECTIVE: KC
How to Protect Your Car from Radio Jammers
POCSAG and Radio Privacy
Auditing the MiFi2200
Hiding the Hacker Instinct
Starting a Path to Modern Database Privacy
TRANSMISSIONS: SUMMER
A Brief Guide to Black Edition XP
The Many Uses of SSH Tunnels
Senatorial Courtesy Plates - An Inside Look
Fishing with Squid
PAYPHONE PHOTO SPREAD
Awakenings
New Thoughts
and Eye Candy
Introduction to Chrome OS
Bypassing Shell Restrictions
Phishing on an iDevice
TELECOM INFORMER: AUTUMN
Network Anonymity Through “MAC Swapping”
Both Sides of the Story
Video Game Hacking
Hacking Alt Detection in Second Life
HACKER PERSPECTIVE: Bruce Sutherland
How to Spoof Another User in MindAlign
Access Control: A Fancy Facade
Go Daddy Shared Hosting Review
Logging and Analysis with Your GPS-enabled Phone
Cellphone, Keys, Wallet? Check!
Mobile Hacking: Really
TRANSMISSIONS: AUTUMN
Asterisk, The Gatekeeper
Wear a White Hat
How I Got Firefox to Accept the Tel Tag for Phone Calls
Movements
Google Temphptations
Free Phone Numbers with Google Voice
Abuse Reports Still Work
MAC Spoofing Your Way to Free Internet
Hacking Refog Keylogger
TELECOM INFORMER: WINTER
Who is Anonymous?
Property Acquisition - For Free?
Let’s Feed the Phishes
Bypassing Universal Studio’s MP3 Security the EZ Way
Internal Denial of Service with Fork and Malloc Bombs
Whitelisting with Gmail
Eye Spy
How to Social Engineer Your Local Bank
Laptop Repair, Customer Beware
HACKER PERSPECTIVE: Tiffany Strauchs Rad
More Active Gamers Should Become Activist Hackers
Simplex Locks: Illusion of Security, Version 2.0
Hacking Is in the Blood
Support for Cable Providers? Why?
Pre-Texting-R-Us
Pirating the Caribbean
Perfect Encryption - Old Style!
The Piracy Situation
TRANSMISSIONS: WINTER
Anonymity and the Internet in Canada
Elegant Password Generation with Oplop
Hacking the Winn-Dixie Survey
Switch
Fiction: Kill Switch
LETTERS TO 2600
2600 MEETINGS
BACK COVER PHOTO SPREAD
Hacker Digest 27 - 2011
Cloudy Skies
Insecurities in Emergency Rescue
AJAX Hacking for the Discerning Pro Wrestling Fanatic
A Little Fish in a Big Pond
The Grey Hat Manifesto
TELECOM INFORMER: SPRING
No Sale for You!
CrazyGeorge - Security Through Obscurity
BartPE: A Portable Microsoft Windows
Infl uential Angles
HACKER PERSPECTIVE: Bill from RNOC
The Hacker Enigma: Positives, Negatives and Who Knows?
An Introduction to CSRF Attacks
The Voyager Library Information System
“Print Me?” Why, Thank You!
My First Hack
Dr. Jekyll and Mr. PayPass
Writing a Small Port Checker in C in 40 Lines (or Less)
Procurve Switch Hacking
TRANSMISSIONS: SPRING
Bluetooth Hacking Primer
Simple How-to on Wireless and Windows Cracking, Part 2
The Hacker Dialogue
Hacking Google Analytics
My Second Implant
Free Encrypted 3G Web Access on T-Mobile Smartphones
Why Cell May Die in a Modern Hacker’s World
TELECOM INFORMER: SUMMER
Call the World for Free
How to Create Mass Hysteria on a College Campus Using Facebook
Educational Wireless Honeypots
I’m Not a Number
How I Scored the Avaya PBX Init Password
Why You Need a Grimoire
Potential Laptop Recovery
Hacking Boingo Wireless
How AT&T Data Plans Work (and How to Make Them Stop Working)
Casual Encounters of the Third Kind: A Bayesian Classifi er for Craigslist
Outline for a Simple Darkserver and/or Darknet
Goog411 Skype Hack
Hacking Autodialer Telephone Access Systems
TRANSMISSIONS: SUMMER
Written in Spam
Roll-your-own Automated System Restore Discs
Grazing Voicemail Passwords
Private Key Exchange Using Quantum Physics
How to Overwrite JUNOS Proprietary Code
PAYPHONE PHOTO SPREAD
Confl ict in the Hacker World
Read All About It! Online Security and Paid Newspaper Content
Old School Hacking
How I Learned to Stop Worrying and Spam the Scammers
TELECOM INFORMER: AUTUMN
Forgeries, Branding, and Network Theory in the Digital Playground
SPAM Simplified
Hacking Out
Man in the Middle Attack
HACKER PERSPECTIVE: Barrett D. Brown
IPv6 Connection Hijacking and Scanning
Gmail and SMS Gateway Fun
Moving from Robotics to Artifi cial Intelligence
Seven Things Hackers Did Right
Life Without Walls: Circumventing Your Home Security System
TRANSMISSIONS: AUTUMN
How to Turn Local Admin into Domain Admin
Panasonic Phreaking In the New Age
Hacking and Securing the Tandberg C20
Changing Landscapes
Bash Bash Bash!
How to Cheat at Foursquare
The (Obvious?) Dangers of Free WiFi
The Buck Stops Here: Inside AT&T’s Tier 2 Tech Support
TELECOM INFORMER: WINTER
Various Vulnerabilities in the UPS Shipping System
Ode to the United States Postal Service
Android, You Broke My Heart
Corporate Reconnaissance for the Anti-Social
HACKER PERSPECTIVE: John W5EME
Anti-Satellite (ASAT) System for Dumbasses
The Trouble with the “Digital” Music Industry
Invisible ASCII: A Poor Person’s Steganography
EMR Interception and the Future of Computer Hacking
The Joy of IPv6
Dormitory Phishing
How to Find Information on People Using the Internet
TRANSMISSIONS: WINTER
Phun with FOIA
iBahn Hotel Site Kiosks and How to Pwn One
RAM Dumping
Who’s Got Your Vote?
Vulnerabilities in Quantum Computers
LETTERS TO 2600
2600 MEETINGS - 2011
BACK COVER PHOTO SPREAD
Private Key Exchange Using Quantum Physics
How to Overwrite JUNOS Proprietary Code
PAYPHONE PHOTO SPREAD
Conflict in the Hacker World
Read All About It! Online Security and Paid Newspaper Content
Old School Hacking
How I Learned to Stop Worrying and Spam the Scammers
TELECOM INFORMER: AUTUMN
Forgeries, Branding, and Network Theory in the Digital Playground
SPAM Simplified
Hacking Out
Man in the Middle Attack
HACKER PERSPECTIVE: Barrett D. Brown
IPv6 Connection Hijacking and Scanning
Gmail and SMS Gateway Fun
Moving from Robotics to Artificial Intelligence
Seven Things Hackers Did Right
Life Without Walls: Circumventing Your Home Security System
TRANSMISSIONS: AUTUMN
How to Turn Local Admin into Domain Admin
Panasonic Phreaking In the New Age
Hacking and Securing the Tandberg C20
Changing Landscapes
Bash Bash Bash!
How to Cheat at Foursquare
The (Obvious?) Dangers of Free WiFi
The Buck Stops Here: Inside AT&T’s Tier 2 Tech Support
TELECOM INFORMER: WINTER
Various Vulnerabilities in the UPS Shipping System
Ode to the United States Postal Service
Android, You Broke My Heart
Corporate Reconnaissance for the Anti-Social
HACKER PERSPECTIVE: John W5EME
Anti-Satellite (ASAT) System for Dumbasses
The Trouble with the “Digital” Music Industry
Invisible ASCII: A Poor Person’s Steganography
EMR Interception and the Future of Computer Hacking
The Joy of IPv6
Dormitory Phishing
How to Find Information on People Using the Internet
TRANSMISSIONS: WINTER
Phun with FOIA
iBahn Hotel Site Kiosks and How to Pwn One
RAM Dumping
Who’s Got Your Vote?
Vulnerabilities in Quantum Computers
LETTERS TO 2600
2600 MEETINGS - 2011
BACK COVER PHOTO SPREAD
Hacker Digest 26 - 2010
Year 26
ATA Security Exposed
Outsourced
Annoying Dormitory Phones
robots.txt Mining Script for the Lazy
TELECOM INFORMER: SPRING
Surfing Without a Board
MP3s: A Covert Means of Distributing Information
Catching an iPod Thief Using Forensic Evidence
Inside Google Radio
Scour: Paid to Search, Again?
Battling the Fanuc Data Panel
Network Neutrality Simplified
HACKER PERSPECTIVE: Virgil Griffith
Second Life Hacking
Exploiting Price Matching Through Javascript Injection
DNS Spoofing on a LAN
An Astronomer’s Perspective on Hacking
TRANSMISSIONS: SPRING
Social Engineering HP for Fun and Profit
The Last 1000 Feet
Not The Enemy
Regaining Privacy in a Digital World
The Security-Conscious Uncle
Why the “No-Fly List” is a Fraud
TELECOM INFORMER: SUMMER
Finding Information in the Library of Congress
Hacking the DI-524 Interface
Simple How-to on Wireless and Windows Cracking
If You Can’t Stand the Heat, Hack the Computers! (Part 1)
Security: Truth Versus Fiction
Hacking the Beamz
HACKER PERSPECTIVE: Jason Scott
iTunes Stored Credit Card Vulnerability
Zipcar’s Information Infrastructure
The How and Why of Hacking the U.N.
Listen to Radio Hackers!
Abusing Metadata
Verizon FIOS Wireless Insecurities
TRANSMISSIONS: SUMMER
Using Network Recon to Solve a Problem
Suing Telemarketers for Fun and Profit
CONTENTS AND
INGREDIENTS
PAYPHONE PHOTO SPREAD
Hacking in Tents
Exploiting University Students using Rogue Access Points
Catching a Laptop Thief/WiFi Hacker
Attacking a Blind Spot
How to Almost Hide Your Digital Identity While Port Scanning
TELECOM INFORMER: AUTUMN
Hello! Google Calling
Post-Apocalyptic Communications
Roll Your Own Hive-Mind
Free DirecTV on Frontier
Free Trials - Avoid Giving Out Your Credit Card Number
If You Can’t Stand the Heat, Hack the Computers! (Part 2)
HACKER PERSPECTIVE: Johannes Grenzfurthner
Granny Loves Linux!
Cracking WPA - PSK
Hard Disk Encryption, No Excuses
Microsoft, Please Salt My Hash!
How to Get Free Loans From American Express
TRANSMISSIONS: AUTUMN
SSL DNSSEC
Tethering the Samsung SCH-R450 on MetroPCS
“Borrowing” the CustomInk.com Vector Library
Hacking Your Hospital Bed
Smart Regression
Pwning Past Whole Disk Encryption
L33ching the L33chers: Using a Portable Wireless Network
TELECOM INFORMER: WINTER
Hacking Tor’s Control Protocol
Hack T-Mobile Prepaid Messaging and T-Zones
Calling Comdial Part 2
Underground Physical Network
Understanding Hacking Tools with Socket Programming
HACKER PERSPECTIVE: Annalee Newitz
Hey Adobe! Leave My Boot Loader Alone!
Revenge is a Dish Best Served Cold
Social Engineering from a New Perspective
A Simple Technique for Drum ‘n’ Bass
Retail Automation - ABS
Connecting to streamtheworld Audio Stream Directly
TRANSMISSIONS: WINTER
The Importance of Hacking Your School’s Network
FICTION: The Particle
FICTION: Shakedown
LETTERS TO 2600
2600 MEETINGS - 2010
BACK COVER PHOTO SPREAD