Seaker version 1.23.5

Seaker version 1.23.5

Seaker version 1.23.5written by Corruption http://www.dinc.nu/oonix Corruption@digitchat.net ICQ: 12447053 program in vc++ Requirements: OS: you must be running under, Windows95/98if you are running under a fravor of unix with X-Windows, and would liketo try this software under that system, please contact me and ill compileit under that or if alot of people start asking me for it ill upload itmy site.Ram: 8bit or higherCPU Speed:.....

You have just entered room “Observers.”

You have just entered room “Observers.”

You have just entered room "Observers."JTM297: yayJTM297: now where were we :xJTM297: Did you guys see that one site..for Interals?JTM297: Internals*nofear: Your new SERA ID will be "aol", lower case, plusyour 6 digit employee ID, (e.g., aol012345). Youwill be required to login using a Passcode.nofear: ThisPasscode consists of a PIN, which you create, andthe 6 digit display on your SecurID key(PIN + SecurID Display = Passcode).JTM297: yeah i know I read the.....

Subprofile.com Exploit

Subprofile.com Exploit

Several "hackers" discovered the password to the sample profiles on www.subprofile.com (All the servers). On 7/23/02, A guy going by the alias "JTM" decided he wanted to know how to change the subprofile without a password. He started a program called "webproxy" developed by @stake. This program allows you to EASILY change the variables passed through files on websites. He figured out how to change.....

The AOL Privacy Policy

The AOL Privacy Policy

The AOL Privacy Policy Here at AOL, we regard our members' privacy as one of our most important values.  We want our members to know how we protect their information and what choices they have about its use.  We believe AOL's Privacy Policy should give members confidence whenever they use AOL -- 24 hours a day, seven days a week, 365 days of the year. .....

PPN – Concepts of Echelon by Phonetap – November 07, 1999

PPN – Concepts of Echelon by Phonetap – November 07, 1999

The Phone Punx Network Presents--Phone Punx Magazine------Issue three----"We are the phony in telephony"November 07, 1999Last Updated: November 07, 1999http://fly.to/ppn(Mirror: http://worship.to/ppn)phonepunx@yahoo.com Contents ~Intro by Mohawk ~Beginners Guide to the DACS, Part One by BitError ~CallerID: Up close and Personal by hatredonalog ~DATUs - The Tool of the New Age Phreak: Part II by MMX ~Frequency Counters by Black Axe ~An Overview of Trunked Radio Systems by.....

CNN – Feds leave doors open for hackers. – December 22, 1999

CNN – Feds leave doors open for hackers. – December 22, 1999

(IDG) -- After repeated break-ins through the same door, a shaken business owner likely would get the message and buy a sturdy lock, a big dog or a loud alarm. But many agencies have failed to follow such common sense. Repeated intrusions of federal World Wide Web sites reveal that agencies are not adequately training their IT sentries to take advantage of readily available systems.....

InternetNews – Hackers Again Strike AOL – June 19, 2000

InternetNews – Hackers Again Strike AOL – June 19, 2000

America Online, Inc. is the latest Net crime victim to have the privacy of some of its 23 million members violated. While the extent of weekend damage is unknown, the knowledge of how to access security holes in America Online's (Quote, Chart) network is spreading quickly through Internet channels. While AOL members are assured at every point of contact that their information is secure from potential maliciousness,.....

ABC News – FAA Computers are Insecure – September 27, 2000

ABC News – FAA Computers are Insecure – September 27, 2000

 The Federal Aviation Administration skips key background checks on workers, leaves open known security holes, doesn’t even use passwords sometimes and has inadequate firewalls, the report says.      The air-traffic control system hasn’t been successfully attacked, but at least one hacker has broken into an FAA e-mail server. And a year after identifying holes in one FAA system, contractors found the agency had not fixed.....

Hackers’ Excellent Adventures


by 

 
With his baby face and doughy body, 17-year-old Joshua Gilson does not look like your typical FBI quarry.

In fact, huddled over his Toshiba laptop, with rock music blaring from his bedroom stereo and Jerry Springer flickering on the TV, the Sheepshead Bay resident looks like any other teenager, albeit one experiencing maximum sensory overload, 1998-style.

But actually Gilson is part of a nationwide networkof teenage computer hackers who have stolen everything from Internet accounts to credit card numbers, a cybergang that has flourished despite a yearlong effort by the FBI to curb this online piracy, the Voice has learned. “I’ve stolen accounts and stuff like that. I didn’t even think it was that big of a deal,” Gilson said. “Everybody does it.”

For months, federal investigators have been serving subpoenas and search warrants at the homes of these young hackers, carting away computers, disks, modems, and other items as parents watch in horror. Agents with the FBI’s computer crimes squad have recently raided homes across the metropolitan area–from Brooklyn to the New Jersey suburbs–as part of a probe into wide-scale credit card fraud and other cybercrimes.

In several instances, agents visited the same residences more than once — first in mid 1997 and then again earlier this year — because some young hackers were undeterred by the federal probe. According to one court record, a hacker recently boasted to a friend that “nothing could be done to him because he was a minor.”

One federal investigator acknowledged that while “it’s tough to prosecute a juvenile,” the FBI is “not always sure you’re gonna find a teenager” at “the end of the string.” The source added, “And if you do, it still doesn’t mean the game is off, because if the damage is severe enough it is still a crime and it’s still a problem.”

Since the probe is ongoing–and every target appears to be underage —
investigators have tried to keep details of the case confidential, including whether any teenagers have been arrested on federal charges. But interviews with several subjects of the criminal inquiry and a confidential FBI document obtained by the Voice provide a detailed look at the current investigation.

The federal probe began last spring, when agents learned of the “massive deployment of a password-stealing program” on the Internet, according to the FBI document. The scheme targeted accounts on America Online (AOL), the nation’s largest online service. AOL is a favorite nesting place for young hackers, who congregate in chat rooms with names like Dead End and Island 55. “Fifteen seems to be the preferred age for an AOL hacker,” said one long-in-the-tooth 18-year-old hacker.

One eye open | Cracking accounts at night

One eye open | Cracking accounts at night

There was nothing more fun then thinking of a bunch of leets to add to a cracker that I was going to start overnight. I remember everyone had their own PWLs (password lists) from 3200 to 34000 and even larger. (You can find a bunch of the PWL's on here). It all depended on how much time you wanted to put in cracking your leet......