This document describes techniques for hacking into systems using only a web browser. It outlines methods such as exploiting finger and PHF CGI scripts to retrieve a system's password file. Specific examples are provided on querying these scripts on hypothetical aol.com domains to illustrate how an unprotected system could be compromised just by visiting it in a browser. The document also mentions using hidden fields in web forms and HTTP requests to execute system commands or write files on the targeted system.