Intruduction

___There are many kinds of computer security issues within several OSs, networks, and applications. This site distributes many documents and tools which are be used for educational purposes ONLY. They are to be used to better your knowledge of computer security.


Notice

___The documents and tools which are distributed from this site are for the personal experiment and virtual hack/crack on the hosts and network which are administrated by yourself. Do NOT use these tools for actual attacks. We are not responsible for any of the results caused by using these tools and documents.

___Our site is link free. But if you link to us, please link to our top page (http://base.oc.to/skyscraper/byte/551). Do NOT link any other files directly. We do permit the direct link to the security related news site. If you need a link banner to link our site, please use the following banner.s



Members

___We raise our members to construct the contents of our site. If you are interesting in the computer security, cryption, software, OS, network, please e-mail us. We don't set any age, sex, country, race limits to be a member.


English pages

___ We are now translating the contents of our site into English. But, there is much that has not been translated. So, to start we introduce the summary of our site.

1.Distribution of the tools

___ We distribute the original security related tools, which can be used for many kind of attacks. Of course, we are NOT recommending that our tools are used on actual attacks. They are in the "Penguin Toolbox". The abstracts are translated into English.

2. Publication of the documents

___ We publish the original security related documents. The documents can be separate into two types : Technical documents and Educational documents. The technical documents are in, "Penguin Documents". We explain the principles of many kind of attacks, such as stack overflow attacks, sniffers, stealth scanning, spoofing, unix logging, certain kinds of cryptions, trojans, backdoors, cgi holes, traps... and so on. The Educational documents are in, "Penguin Academy". The Hacker and Cracker newbies, and also administrators need the same kind of skills. So, we present the educational course. We prepared the following educational courses : 1. C language, 2. network and packet analysis, 3. UNIX, 4. UNIX kernel, 5. Network programming, 6. Server protection. We will publish more documets which are related to computer security in the future.

3. Notification of the security holes

___ We check the security of certain OSs, applications and network equipment. If we find security holes, we report the information to the appropriate organizations.

4. UG-Lib. project

___ We are now building the "Underground Library", which helps to develope security related tools. This library contains many kinds of useful functions, it can be used with C language.


Contact

If you have any questions, comments, requests, please e-mail us.








Top pages