News
About
Members
Projects
Tools
Email Legions

T O O L S
  KEEN VERACITY

Keen Veracity is the Legions Ezine which is released every so often.

To ensure actual content we may release new editions at seemingly large intervals of time.

We will provide you with something worth while to consume, be it our views on the current affairs or something we have found which is largely of interest to us, and we think others would enjoy.


Keen Veracity - Issue #1  (April 1998)
         * About                  - |          |- optiklenz
          * ------------------------ |          |-
          * Beach Con              - |          |- sync
          * ------------------------ |          |-
          * Phreak Zine            - |          |- optiklenz
          * ------------------------ |          |-
          * This Months Linkage    - |          |- LegionPhreak
          * ------------------------ |          |-

          o-IRC-o

          * Irc Social Engineering - |*revisited|- optiklenz
          * ------------------------ |          |-
          * Legions Script         - |  BitchX  |- HyperLogik
          * ------------------------ |          |-

          o-Neophytes-o

          * Basic Unix Commands    - |          |- optiklenz
          * ------------------------ |          |-
          * Exploits?              - |          |- miah
          * ------------------------ |          |-

          o-Security-o
  
          * HPUX Security Overview - | revised  |- tip
          * ------------------------ |          |-
          * HPUX Exploits Note     - |  bugs    |- optiklenz
          * ------------------------ |          |-
          * Nestea Exploit         - | advisory |- Dallion
          * ------------------------ |          |-
          * Infoseek               - | exploit  |- optiklenz
          * ------------------------ |          |-
          * Fake Mail              - | revised  |- optiklenz
          * ------------------------ |          |-
          * Wingate Exertion       - |          |- optiklenz
          * ------------------------ |          |-
          * backdoor.c             - |          |- jsbach
          * ------------------------ |          |-
          * IP Spoofing            - |          |- optiklenz
          * ------------------------ |          |-
          * Anal Sniff             - |          |- chron1c
          * ------------------------ |          |-
          * Back Attack            - |          |- chrak
          * ------------------------ |          |-
          * Irix LMR               - |          |- optiklenz
          * ------------------------ |          |-
          * Securing Linux         - |          |- BlackIC
          * ------------------------ |          |-
          * FoolProof              - |          |- Duncan Silver
          * ------------------------ |          |-

          o-Misc-o
  
          * pnp56K Linux Setup     - |          |- mosoka
          * ------------------------ |          |-
          * Sniffer Log            - |          |- chrak
          * ------------------------ |          |-

          o-Comic Relief-o 

          * Young Hackers, and Jail  |          |- Analyzer
          * ------------------------ |          |-



Keen Veracity - Issue #2  (August 1998)
    00     * Introductions             - |        | - tip
           * --------------------------- |        | -
    01     * Unix Security             - |        | - Hyperlogik
           * --------------------------- |        | -
    02     * Local Digital Switching   - |        | - JF
           * --------------------------- |        | -
    03     * GSM System Security Study - |        | - David Dane
           * --------------------------- |        | -
    04     * Disrupting DSU Satellites - |        | - optiklenz
           * --------------------------- |        | -
    05     * Playing with Loopback     - |        | - ralph
           * --------------------------- |        | -
    06     * Active X                  - |        | - Defiant
           * --------------------------- |        | -
    07     * Windows with Sockets      - |        | - Sreality
           * --------------------------- |        | -
    08     * Life of a Wingate         - |        | - sektor
           * --------------------------- |        | -
    09     * Lighter Side of Anarchy   - |        | - Danse Fevah
           * --------------------------- |        | -
    10     * In Conclusion             - |        | - tip
           * --------------------------- |        | -



Keen Veracity - Issue #3  (October 1998)
 *  Introduction                              |  [dex|001]   optiklenz                           
 *  Q&A                                       |  [dex|002]   web mail
 *  X-Windows Security                        |  [dex|003]   runeb     
 *  Placing Backdoors Through Firewalls       |  [dex|004]   van Hauser
 *  Detailed Guide to Linux Security          |  [dex|005]   Bronc Buster
 *  HP-UX: A Security Overview, Part Two      |  [dex|006]   tip
 *  Attack on the PKZIP Stream Cipher         |  [dex|007]   Pk
 *  Coordinated TCP Attacks and Probes        |  [dex|008]   Shadow
 *  How to secure your WinGate installation   |  [dex|009]   enema
 *  AT&T/BOC Routing Codes                    |  [dex|010]   foneman
 *  Cellular Carrier Codes                    |  [dex|011]   Herber
 *  Packet Fragmentation Attacks              |  [dex|012]   Cohen
 *  Novell Netware Administration Exploit     |  [dex|013]   Mnemonic
 *  In the News                               |  [dex|014]   sources



Keen Veracity - Issue #4  (November 1998)
[1x8] Introduction                                           Digital Ebola
[2x8] Resilence thru Scripts                                 Duncan Silver
[3x8] NFS Tracing By Passive Network Monitoring              Matt Blaze
[4x8] Kernel Mumblings (part 1 of N)                         FooPirata
[5x8] The Internet Protocol Suite                            m0f0
[6x8] Bic Balistics                                          Nitro
[7x8] In the News                                            Sources
[8x8] Exit()                                                 Digital Ebola



Keen Veracity - Issue #5  (November 1998)
[x1]-->  From the Editor            [ optiklenz<--] 
[x2]     Mail Bag                   [   smtp   <=-]   
[x3]-->  Tcp Wrappers               [  lothos  <--]
[x4]     Novell Security            [  NtWakO  <=-]
[x5]-->  Cellular Guide -           [ downtime <--]
[x6]     USB Theory of Utilization  [ DigiEbola<=-]
[x7]-->  XSniffer                   [ Mnemonic <--]
[x8]     Long Distance Carriers     [  Levine  <=-]
[x9]-->  STD phone codes            [  foneman <--]
[x10]->  Telephony                  [   N6ARE  <=-]
[x11]    Trip to Comdex             [ optiklenz<--]
[x12]->  In the News                [ sources  <=-]
[x13]    Till next time             [ optiklenz<--]



Keen Veracity - Issue #6  (December 1998)  (Original ZIP File)
[01X10] Introduction                                           Digital Ebola
[02X10] Letters to Editor                                      The Readers      
[03X10] The Morris Internet Worm                               Defiant
[04x10] Setting Up Subnets                                     m0f0          
[05X10] Defunct Internet Protocol [DIP Security]               Optiklenz                          
[06X10] Exploiting PPP Frame Byte-Stuffing                     Noc-Wage                                                               
[07X10] NT Security- Tips & Techniques                         Neathack                                                                  
[08X10] Rootfest `99 Details                                   Defiant/Lothos   
[09X10] Revamped bootp Exploit                                 Bronc Buster
[10X10] In the News                                            sources



Keen Veracity - Issue #7

(1/8)--[Introduction]---------------------------------------[Digital Ebola]
(2/8)--[Redir games with ARP and ICMP]-------------------------------[yuri]
(3/8)--[FUN WITH THE ES-3810 AN ATM REALITY]--------------------[optiklenz]
(4/8)--[Ip Aliasing]-----------------------------------------------[guidob]
(5/8)--[Yet Another Newbies Guide to Linux Security]--------[Digital Ebola]
(6/8)--[UBE98 -- Unbreakable Encryption]----------------------[Joe Peschel] 
(7/8)--[Windows 95 Protection]-------------------------------------[NtWak0]



Keen Veracity - Issue #8  (July 1999)
.-[ Keen Veracity, Volume 3, Issue 8 ]
|
|__Introduction
|  |_ kv[1]; General Information..................................staff
|  |_ kv[2]; Statement........................................optiklenz
|
|__Computer Security
|  |_ kv[3]; Port Scan Detection..............................t0ucht0ne
|  |_ kv[4]; Introduction to MoNet...............................uplink
|  |_ kv[5]; Article on HIPNET..................................zipcode
|  |_ kv[6]; Intrusion Detection Systems......................ProtocolD
|  |_ kv[7]; Another IE Exploit?.................................ntwak0
|  |
|  |__Programs/Source Code
|  |  |_ kv[8]; tryseg.c.........................................guidob
|  |  |_ kv[9]; match.c...........................................icesk
|  |  |_ kv[10]; netsniff.c (reprint)...........................mnemonic
|  |  |_ kv[11]; liberty.c........................................guidob
|  |
|  |__Miscellaneous
|     |_ kv[12]; Ode to JP....................................krankshaft
|     |_ kv[13]; Top WWW Sites...................................ntwak0
|
|__Telephony/Radio
|  |_ kv[14]; Intro to Loops.....................................hitman
|
|
|_ kv[i]; outro



Keen Veracity - Issue #9
[0001]=========================[Editorial - Digital Ebola   <digi@legions.org> ]
[0010]===========================[Ode to JP Part II - KrankShaft <ks@rmci.net> ]
[0011]========[Biometric Concepts in UNIX - Digital Ebola <digi@linuxpron.com> ]
[0100]====[The Senseless Guide to Modem Commands - fejed   <fejed@legions.org> ]
[0101]============[Hole in CyberCop Monitor 2.0 NT - Proto <proto@legions.org> ]
[0110]==================================[Smart Dust - shekk <shekk@smurfs.com> ]
[0111]====================[More Bugs In Windows NT - Ntwak0 <wak0@legions.org> ]
[1000]===================================[Optimizing UNIX C - S <super@ce.net> ]
[1001]===================================[Hammer2K - Threx <threx@attrition.org]
[1010]=====================[Hax0ring The Slurpee - Phriction <phric@legions.org]
[1011]========================================[Keen Veracity Spam - The Readers]



Keen Veracity - Issue #10
[1]==============================[Editorial - Digital Ebola <digi@legions.org> ]
[2]=====================================================[KV Spam - The Readers ]
[3]===================[Theory of Denial of Service - fejed <fejed@legions.org> ]
[4]=============================[Project Sp00fed - threx <threx@attrition.org> ]
[5]=========[KV10's 30 Second Useful Script - Digital Ebola <digi@legions.org> ]
[6]=============[Booty Con 2000, Rubicon Account -  sodium <sodium@omega2.net> ]
[7]====================================[Spider DoS - fejed <fejed@legions.org> ]
[8]==================================[FTP Advisory - fejed <fejed@legions.org> ]
[9]====================[Women In Technology - Godess <godess@securityflaw.com> ]
[10]===============[Expecting Mass Commands - Digital Ebola <digi@legions.org> ]
[11]=================================[NT Logging - NtWak0 <ntwako@legions.org> ]
[12]========================[UNIX Autopsies - Digital Ebola <digi@legions.org> ]
[13]========================[One Large ISP - Anonymous <anonymous@legions.org> ]
[14]=====================[Simple HTTP Security - Phriction <phric@legions.org> ]
[15]=========================[Hacker Paladins - Raschid <CogitoESum@yahoo.com> ]
[16]================[PERL Site Verification - Crater <ddfelts@ultravision.net> ]
[17]==================[Legions Survey - Gridmark/Phriction <gimps@legions.org> ]
[18]============[Guide to 0wning Your School - Gridmark <gridmark@legions.org> ]
[19]===========[OpenBSD Security Overview - David Jorm <davidj@wiretapped.net> ]
[20]=======================[Air Gapped Networks - dayzee <dayzee@madsekci.net> ]
[21]=================================[TKblink - clocker <clocker@adelphia.net> ]
[22]==================================[TCP/UDP - dayzee <dayzee@madseckzi.net> ]
[23]====================[Teleconferencing - Vixen <flutterby_2001@hotmail.com> ]
[24]==========[TCP IP Datagrams Explained - vortek <syntech@intraworldcom.net> ]
[25]=================================================[Parting Rant - The Editor]
[26]=================[The Art of Selling Out - J-P <j.p@b3ss13.ant10nl1ne.com> ]



Keen Veracity - Issue #11
[1]==============================[Editorial - Digital Ebola <digi@legions.org> ]
[2]=====================================================[KV Spam - The Readers ]
[3]============================[Cell Shell - Morbid Angel <morbie@legions.org> ]
[4][Getting the most from a Linksys Cable/DSL Router - pr00f <pr00f@pr00f.org> ]
[5]=======================[Mozarela Kernal Trojan - arkmp <cippa@hobbiton.org> ]
[6]======[A Newbies Guide To Sockets in PERL - Beowulf <beowulf3@telocity.com> ]
[7]===[Curiosity killed the American Citizen - Firewa11 <firewa11@legions.org> ]
[8]========[Microsoft's OpenSource Policy - Our Elite Spy <submit@legions.org> ]
[9]=============[PERL Headache of the Issue - Digital Ebola <digi@legions.org> ]
[10]=========================[Fun with XOSD - Digital Ebola <digi@legions.org> ]
[11]=====================[More PERL Madness - Digital Ebola <digi@legions.org> ]
[12]==========[CISCO PIX Connection Monitoring - DataShark <nomad@legions.org> ]
[13]======================[Poor Man's Boards - BigGeezer <ddfelts@legions.org> ]
[14]=================================[YAPOTTLK - Lawless <lawless@legions.org> ]
[15]=================[I Got Windows, Now What? - Ntwak0 <adonis1@videotron.ca> ]
[16]=======[RIP - pr00f <pr00f@pr00f.org> / alkinoos <alkinoos@project802.net> ]
[17]=======================[Anti-Anti-Sniffer Patch - Vecna <vecna@s0ftpj.org> ]
[18]====================[The Wait (fiction) - Digital Ebola <digi@legions.org> ]
[19]========================================[Carolyn Does It Again - Anonymous ]
[20]==========================[Love's Freedom - Raschid <cogitoesum@yahoo.com> ]



Keen Veracity - Issue #12  (July 2002)
[1]==============================[Editorial - Digital Ebola <digi@legions.org> ]
[2]=====================================================[KV Spam - The Readers ]
[3]============================[Hacking WAP/WEP - NtWaK0 <ntwak0@safehack.com> ]
[4]======[KV's 30 Second Scripting Solution - Digital Ebola <digi@legions.org> ]
[5]====[XMMS-Winamp How-To for Gentoo Linux - feach <blie@cylentkreationz.com> ]
[6]===========================[Your Privacy and HP - b0ld <submit@legions.org> ]
[7]==============[Phone Phreaking Lives with AT&T - Cobra <cobra@hfactorx.org> ]
[8]==========[Security Method and Technique - Digital Ebola <digi@legions.org> ]
[9]==============[Java Virii - Archimedes <archimedes@security-foundation.net> ]
[10]=========[The Scene Is Seen As Absolute Shit - 2dHero <submit@legions.org> ]
[11]================[Linux C Socket Programming - ??????? <submit@legions.org> ]
[12]======[Dallas Metroplex Wardriving Data - Digital Ebola <digi@legions.org> ]
[13]========================[Seattle Wardriving Data - pr00f <pr00f@pr00f.org> ]
[14]======[OpenSSH Update Script - Gridmark <gridmark@planetmotherfucker.net > ]
[15]==============================================[Random Rants - Random People]
[16]========[Travel - Tips for Visiting Holland - Rewben <ruben@generation.nl> ]
[17]=================[Sex and Geeks Do Not Mix - Vecna <vecna@insertcoint.net> ]
[18]============================[Hey, Big Brother - Yarddog <yard@legions.org> ]
[19]=====[The Escalation to Economic Turmoil - OverDose <overdose@legions.org> ]
[20]=====[How To Hack your Way Out Of A Paper Box - Kiddish <kiddish@hehe.com> ]
[21]=========================[Delirious IDS - Digital Ebola <digi@legions.org> ]
[22]=====[Custom TCP Port Scanning using IP Sorcery - Case <phric@legions.org> ]
[23]=================[Business for Dummies - eDfGr33n <blooddjinn@hotmail.com> ]
[24]=============[The New Hackers Manifesto - Digital Ebola <digi@legions.org> ]
[25]======================================[SIGHUP - Legions of the Underground ]



Keen Veracity - Issue #13
[1]===========================[Editorial - Archimedes <Archimedes@legions.org> ]
[2]==============[Best of KV Issue 3: Packet Fragmentation Attacks - Dr. Cohen ]
[3]=============[Blind Scanning using ARP - Case/Phriction <phric@legions.org> ]
[4]=[Best of KV Issue 7: Playing redir games with ARP and ICMP - yuri volobuev ]
[5]===========[Best of KV Issue 10: NT Logging - NtWak0 - <ntwak0@safehack.com>]
[6]==[Blackboard 5 Password Enumeration - Case/Phriction - <phric@legions.org> ]
[7]====================[ The InfoSec Art of war - VulnDev - <mark@vulndev.org> ]
[8]=============================[Connect back shell in R - <xonox@b0rken.com> ]
[9]=======================[Insight into: Non-repressive Governments - The Barn]
[10]=========================[Snorting Cisco - Digital Ebola <digi@legions.org>]
[11]====================[Artificial Infosex - Datacide <datacide@inet-sec.org> ]



Keen Veracity - Issue #14  (October 2005)
[1]====================================[Editorial - Lothos <lothos@lothos.org> ]
[2]============================================[Squatters Exposed! - Anonymous ]
[3]========================[The Art of: Social Engineering - danny@away.net.au ]
[4]=======================================[ciscoBNC.c - chrak <chrak@b4b0.org> ]
[5]===================[Wireless Technology Exposed - Vortek <vortek@gmail.com> ]
[6]==================================[Harriet the Spy - Dreid <dreid@dreid.org ]
[7]=============================================[Review of ToorCon - Overdose1 ]
[8]=====================================================[This issues LAMER.log ]
[9]==============================================================[/dev/urandom ]



© 2001 Legions Corporation.   Steal anything, and we'll get it back, don't you worry :c)
All mention of LoU, Legions of the Underground, Legions, KV, or Keen Veracity copyright (c) 2000 legions.org, all rights reserved.