AOL Pulling

Hi I'am Michael Wilson with AOL's Operation Security department, are you familiar with OpSec? If No: Operations Security is a department that investigates all flaws and problems concerning the PegaReach/Merlin software which is installed on every PC on the AOL internal server.And the reason you're receiving this call today is because someone from your terminal has submitted a problems report using the "PROBLEMS" report option…

AOL Printing in Northern Virginia

PRINTING IN NORTHERN VIRGINA

December 21, 2001

 

ADDING A PRINTER

STEP ONE – Save and close any application you may be running. This way if a problem arises no data    will be lost if you have to shut your pc down and reboot. Know the name of the printer you want to install. All network printers should have a name label on the front.

STEP TWO – Select the print server.

Printer located in:    Your print server is:       Printer located in:                  Your print server is:

CC1 – 1st Floor         \\AOLCC101HP            CC5 – 1st Floor                        \\AOLCC502HP

            2nd Floor       \\AOLCC102HP                        2nd Floor                      \\AOLCC502HP        

CC2 – Basement      \\AOLCC202HP                        3rd Floor                      \\AOLCC504HP       

Hackers’ Excellent Adventures

by 

 
With his baby face and doughy body, 17-year-old Joshua Gilson does not look like your typical FBI quarry.

In fact, huddled over his Toshiba laptop, with rock music blaring from his bedroom stereo and Jerry Springer flickering on the TV, the Sheepshead Bay resident looks like any other teenager, albeit one experiencing maximum sensory overload, 1998-style.

But actually Gilson is part of a nationwide networkof teenage computer hackers who have stolen everything from Internet accounts to credit card numbers, a cybergang that has flourished despite a yearlong effort by the FBI to curb this online piracy, the Voice has learned. “I’ve stolen accounts and stuff like that. I didn’t even think it was that big of a deal,” Gilson said. “Everybody does it.”

For months, federal investigators have been serving subpoenas and search warrants at the homes of these young hackers, carting away computers, disks, modems, and other items as parents watch in horror. Agents with the FBI’s computer crimes squad have recently raided homes across the metropolitan area–from Brooklyn to the New Jersey suburbs–as part of a probe into wide-scale credit card fraud and other cybercrimes.

In several instances, agents visited the same residences more than once — first in mid 1997 and then again earlier this year — because some young hackers were undeterred by the federal probe. According to one court record, a hacker recently boasted to a friend that “nothing could be done to him because he was a minor.”

One federal investigator acknowledged that while “it’s tough to prosecute a juvenile,” the FBI is “not always sure you’re gonna find a teenager” at “the end of the string.” The source added, “And if you do, it still doesn’t mean the game is off, because if the damage is severe enough it is still a crime and it’s still a problem.”

Since the probe is ongoing–and every target appears to be underage —
investigators have tried to keep details of the case confidential, including whether any teenagers have been arrested on federal charges. But interviews with several subjects of the criminal inquiry and a confidential FBI document obtained by the Voice provide a detailed look at the current investigation.

The federal probe began last spring, when agents learned of the “massive deployment of a password-stealing program” on the Internet, according to the FBI document. The scheme targeted accounts on America Online (AOL), the nation’s largest online service. AOL is a favorite nesting place for young hackers, who congregate in chat rooms with names like Dead End and Island 55. “Fifteen seems to be the preferred age for an AOL hacker,” said one long-in-the-tooth 18-year-old hacker.

Padillac’s aim bump v1

#######################[yayo.org]################################### ###########[yayo.org]##################################################### ## ## ## [+] vulnerable software: aim express 7.0 ## ## [+] discovered by: pad aka padillac escobar ## ## ## ## [+] capabilities: bumping, password scrambling, account suspension ## ## [+] discovered on: 08/20/08 ## ## [+] partially patched on: 09/09/08 ## ## ## ## [+] notes: a few people have been asking for an explanation as to ## ## how i…

Morphing

If you ever want to load a tool twice for some reason or just morph a tool (like what was done with master.aol 3.0) there is an easy way to do this. For example lets say I wanted to change master.aol's ID so that AOL wouldn't say "Not Authorized to use the master tool." All you have to do is first run the manage tool…

AOL Instant Messenger is hacked

Three 17-year-olds take credit for inserting pornographic images into America Online’s widely used chat service. Users of the latest version of AOL's Instant Messenger (AIM) software started encountering an unpleasant surprise on Saturday morning: At least three crackers -- malicious hackers -- began inserting pornographic images into "AIM Today" and vandalizing content on at least four screens of the chat software. Since last August, users…
Who is Smokey?

Who is Smokey?

All my life I have loved computers, even as a kid when the only ones out were those apple’s (the ones wolfenstein worked with). I remember just pucnhing keys on the keyboard as if it were connected & as if I were this elite computer wizard. So in the 90’s when AOL first came out my father bought the family our first computer. I remember…

Database Hack Takes Gullible By Storm

San Francisco -- Speculations were rampant during the course of the week, as discussion groups, security newsletters and even headlines jumped at what appeared to be another high-profile hack targetting Redmond based software giant, Microsoft. Well, there may have been a hack - but Microsoft wasn't the victim. It began with a trickle of commentary, but by the end of the week, thousands of internet users…
AOL Instant Messenger RIP  10/6/2017

AOL Instant Messenger RIP 10/6/2017

It's the end of an online era ... AOL is officially ending AIM. "We’ve made the decision that we will be discontinuing AIM effective December 15, 2017," a rep for the company confirmed. So, say goodbye to your buddy list ... kiss that yellow running man goodbye. So, why is AIM being laid to rest? "AIM tapped into new digital technologies and ignited a cultural…
The AOL Protocol

The AOL Protocol

The AOL Protocol

When you hear the phrase “The AOL Protocol”, I bet most of you immediately think of FDO, right?
Although FDO is a part of the AOL protocol, it in no way encompasses the big picture. When I use
the term “The AOL protocol”, I refer to how the AOL client and server interact with each other,
how data is prepared, how it is sent, and how it can be manipulated.

There currently exists no formal documentation of the AOL protocol, or at least one that is
publicly available. For this reason, I have taken it upon myself to strip the bits of
information from my feeble mind and write a document with at least basic information about
the AOL protocol. The information included in this document is what I have learned, from
exploration, help from others, and just stumbling upon it. I in no way guarantee the accuracy
of the information contained herein. That said, here is what I know.

From O0O of AOL-Files

I found this old post from O0O of the old AOL-Files.com site posting this on DigitalGangster.com

 

Join Date:  Apr 2007
Location:  NYC
Posts:  1,428

 

its funny how 12-14 years later people remember things so much differently than what you remember. Many of the names here I haven’t seen since bouncing around the PRs in the late `90s. Many of you remember the “leet” SN jackers/suspenders and the progger types….or guys like Kali that cracked OHs to scroll for hours on end…

 

I have a very different perspective, I spent most of my time on IRC or in PRs that many in the scene didn’t know about like “leo9” and “atomdrop”.

 

We had some very smart people in the scene back then, many of them went on to be very successful over the past 12 years….a couple of them I’m glad to still be able to talk to/work with IRL. Some ended up in jail or are dead now. There was a lot of crazy shit going on behind the scenes that kept the scene moving forward, even though there were a couple thousand of us and only some spoke to each other, we were still all tied together through the exploits and programs that a small cadre of really smart dudes figured out and built for others.