About

About

JustinakaPaste.com is dedicated to my childhood from 1998-2005 - everything related to the AOL/AIM scene.  From AOL/AIM Progs, Exploits, Security Breaches, Hacks, Screen Names (leets, 2chars, 3chars, INTs, overheads, hosts, restricteds, indents), AOLers, AIMers, Employee Sections, AOL/AIM Articles & Tutorials, SecurID, Merlin, <M><, <><, Keyword Defacements, Old AOL Site Archives, Fallen AOL h4ckers (RIP), AOL Chat Logs, Macro Art, AOL Scam Sites, AOL Progs from…
Who is Smokey?

Who is Smokey?

All my life I have loved computers, even as a kid when the only ones out were those apple’s (the ones wolfenstein worked with). I remember just pucnhing keys on the keyboard as if it were connected & as if I were this elite computer wizard. So in the 90’s when AOL first came out my father bought the family our first computer. I remember…
1999

1999

So now its 1999 after web I dove into visual basic to learn to code my own progs.  I cant remember the person that helped me add bas files, and how to call the different subs in that module such as ChatSend. Programming in VB was different then coding websites but wasnt to far off. There was actually a ton of sources and content available.…
Old AOL Phishing Phrases

Old AOL Phishing Phrases

Hi, I’m with AOL’s Online Security. We have found hackers trying to get into your MailBox. Please verify your password immediately to avoid account termination. Thank you. AOL Staff

Hello. I am with AOL’s billing department. Due to some invalid information, we need you to verify your log-on password to avoid account cancellation. Thank you, and continue to enjoy America Online.

Good Evening. I am with AOL’s Virus Protection Group. Due to some evidence of virus uploading, I must validate your sign-on password. Please STOP what you’re doing and Tell me your password. — AOL VPG

These have been pulled from an old module (.bas) file.

Exploring Historical & Emerging Phishing Techniques

Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.