Trance
Trance

Created by The Great NoVa http://novasrealm.cjb.net  
Sub 7 2.1.5 [Read Me]

..::MAXIMIZE & TURN ON WORD WRAP::.. ======================== - Sub 7 2.1.5 - - coded by mobman - _ ReaDMe/Tutorial _ - by FuX0reD - [ http://www.sub7.net ] ======================== Intro: In this tutorial I, FuX0reD, will try to do as much hand-holding and will try to be as THOROUGH as possible, AND IT WILL BE IN PLAIN ENGLISH (for those people who dont know, or dislike.....
TCP\IP: A Mammoth Description

_________________________________________________________________________ TCP\IP: A Mammoth Description By Ankit Fadia ankit@bol.net.in_________________________________________________________________________ TCP\IP or Transmission Control Protocol \ Internet Protocol is a stack or collection of various protocols. Aprotocol is basically the commands or instructions using which two computers within a local network or theInternet can exchange data or information and resources. Transmission Control Protocol \ Internet Protocol or the TCP\IP was developed around the time of theARPAnet......
Extracting Web Server Information using Telnet

Extracting Web Server Information using Telnet / by R a v e N
<===========================================================>
http://blacksun.box.sk

Welcome to yet another BSRF tutorial. This time, I will teach you most basic command in the HTTP protocol, and how it is possible to extract tons of web server information and other pieces of info using this command only and a telnet client.

Okay, you are about to learn what your browser does when you type in, say, blacksun.box.sk. First of all, it connects to blacksun.box.sk on port 80. If there is an answer on the other hand, which means that the port is open (the port is not closed or blocked by any filtering software, such as a firewall) and a TCP session can start, your browser would usually type this:
get url HTTP/1.1
(followed by a blank line)

Local Windows hacking for newbies

.-‘____________|______
| |
| Your computer |
| is dead… |
| and it was so alive | Local Windows hacking for newbies
| _______ |
| |.—–.| | Written by MiggyX for the Black Sun Research Facility
| ||x . x|| |
| ||_.-._|| | Contact : miggyx@amicoders.demon.co.uk
| `–)-(–` |
| __[=== o]___ | Coming together is a beginning, Staying together is
| |:::::::::::|\ | progress, Working together is success!
| `-=========-`() |
| You shouldn’t have |
| installed: |
| |
| -= Win’95 =- |
`———————`

Old AOL Phishing Phrases
Old AOL Phishing Phrases

Hi, I'm with AOL's Online Security. We have found hackers trying to get into your MailBox. Please verify your password immediately to avoid account termination. Thank you. AOL Staff Hello. I am with AOL's billing department. Due to some invalid information, we need you to verify your log-on password to avoid account cancellation. Thank you, and continue to enjoy America Online. Good Evening. I am.....
Server List
Server List

Server

OK,if anybody here doesn’t know what a server is, then don’t worry about it. Below, you see a bunch of songs, don’t worry about the junk in front of it that says like (~audio) or something, just scroll through the list and look. There are games/proggies/punters, and MP3’s on the list. For those of you who don’t know what a MP3 is, its a complete version of the song that sounds just like a cd but its on your computer. If you need a MP3 player, i suggest you get NAD, its real small and short to download. Once you find a song(s),a Game(s),a proggie(s), or a punter(s), just click on the little animated mailbox, it will bring up an e-mail form to E-Mail me. In the subject, type MP3, and then in the main E-Mail, type the # of the song/game,etc… on the list, the name of the song/game,etc…., and the author if its a song. I will then reply to the mail with the item you requested attached. Come back often, because I update my list with more and more stuff!!!!

Soft-ICE [Read Me]

Please read the Soft-ICE for Windows 95 documentation for
the latest product information.
1) To install Soft-ICE for Windows 95, run SETUP.EXE and the install wizards
will guide you to completion. Once this is complete, please consult the
‘Starting Soft-ICE for Windows 95’ section of the documentation. Soft-ICE
cannot be run directly from Windows 95, or from a DOS box within Windows 95.

The Hackers Handbook [Read Me]

T H E H A C K E R ‘ S H A N D B O O K
Copyright (c) Hugo Cornwall

All rights reserved

First published in Great Britain in 1985 by Century Communications Ltd

Portland House, 12-13 Greek Street, London W1V 5LE.

Exploring Historical & Emerging Phishing Techniques
Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.