AOL PiMPS

AOL PiMPS

THEY'RE BACK, AND THEY'RE BETTER THAN EVER! Saturday, October 15, 2005 My goodness, I received an email recently from a long retired pimp from many years ago. The one and only CandyMan sends his regards to all the pimps who continue with the daily struggle of finding some ho's to slap around. Candy of course, being one of the founding fathers of the warez scene,…

Prog Password List

Acid Burn: (one of these) PiXY RuLEz You! or upsidedown or03/17/96

Agent Orange Tosser: I Crap On Lamers ivan is a fairymaxuck

Anti-mass mailer: bud is blah

AoAbortion Tos: Fuck TeRRoR, FAC: KK

AoAbortion FAC: KK

AoAkira: GrEEn DaY

AoAsting: BuBBa , Ugh(AsTiGMaX), John(Prez), AsTiG RuLeZ(member)

AoBliss Tosser: Welcome to the wonderful world of Bliss

AoBomer v1 b1 bot scare: YoUsUck

Aobomer v1 b1 tos: Only TOS LamerZ

AoBomer v1 b2: TOS ALL LAMERZ

AoBomer v1 b3: ALL LAMERZ DIE!

Local Windows hacking for newbies

.-‘____________|______
| |
| Your computer |
| is dead… |
| and it was so alive | Local Windows hacking for newbies
| _______ |
| |.—–.| | Written by MiggyX for the Black Sun Research Facility
| ||x . x|| |
| ||_.-._|| | Contact : miggyx@amicoders.demon.co.uk
| `–)-(–` |
| __[=== o]___ | Coming together is a beginning, Staying together is
| |:::::::::::|\ | progress, Working together is success!
| `-=========-`() |
| You shouldn’t have |
| installed: |
| |
| -= Win’95 =- |
`———————`

IRC Hack

Hacking IRC – The Definitive Guide

Copyright 1996 klider@panix.com Welcome to Hacking IRC- The Definitive Guide. The purpose of this page if you have not already guessed is to provide what I consider optimal methodology for hacking IRC channels. In addition, I provide some of the better channels to hack as well as fun things to do while “owning a channel.”

Contents

Section 1— Why Hack IRC?

Section 2–Requisite Tools

Section 3–What It Takes To Gain Control

Section 4–Link Looker(LL)

Section 5–Bots and Scripts

Section 6–Multi-Collide-Bot(MCB)

Section 7–Pre-Takeover Preparation

Section 8–Thing To Do ONce You “Own” the Channel

Section 9–Best Channels to Hack

Exploring Historical & Emerging Phishing Techniques

Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.