Local Windows hacking for newbies

.-‘____________|______
| |
| Your computer |
| is dead… |
| and it was so alive | Local Windows hacking for newbies
| _______ |
| |.—–.| | Written by MiggyX for the Black Sun Research Facility
| ||x . x|| |
| ||_.-._|| | Contact : miggyx@amicoders.demon.co.uk
| `–)-(–` |
| __[=== o]___ | Coming together is a beginning, Staying together is
| |:::::::::::|\ | progress, Working together is success!
| `-=========-`() |
| You shouldn’t have |
| installed: |
| |
| -= Win’95 =- |
`———————`

Old AOL Phishing Phrases
Old AOL Phishing Phrases

Hi, I'm with AOL's Online Security. We have found hackers trying to get into your MailBox. Please verify your password immediately to avoid account termination. Thank you. AOL Staff Hello. I am with AOL's billing department. Due to some invalid information, we need you to verify your log-on password to avoid account cancellation. Thank you, and continue to enjoy America Online. Good Evening. I am.....
IRC Hack

Hacking IRC – The Definitive Guide

Copyright 1996 klider@panix.com Welcome to Hacking IRC- The Definitive Guide. The purpose of this page if you have not already guessed is to provide what I consider optimal methodology for hacking IRC channels. In addition, I provide some of the better channels to hack as well as fun things to do while “owning a channel.”

Contents

Section 1— Why Hack IRC?

Section 2–Requisite Tools

Section 3–What It Takes To Gain Control

Section 4–Link Looker(LL)

Section 5–Bots and Scripts

Section 6–Multi-Collide-Bot(MCB)

Section 7–Pre-Takeover Preparation

Section 8–Thing To Do ONce You “Own” the Channel

Section 9–Best Channels to Hack

Exploring Historical & Emerging Phishing Techniques
Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.

Comcast.net Hijacker Gets 4 Months
Comcast.net Hijacker Gets 4 Months

A former member of the hacker gang Kryogeniks was sentenced to four months in prison Monday for his role in a 2008 stunt that replaced Comcast’s homepage with a shout-out to other hackers.

James Robert Black Jr., 21,was known as “Defiant” when he and two other hackers hijacked Comcast’s domain name in May of 2008 — a prank that took down the cable giant’s homepage and webmail service for more than five hours, and allegedly cost the company over $128,000.

Visitors to Comcast.net had been redirected to a simple page reading “KRYOGENIKS EBK and DEFIANT RoXed COMCAST sHouTz To VIRUS Warlock elul21 coll1er seven.”

“Mr. Black and his Kryogenicks crew created risks to all of these millions of e-mail customers for the simple sake of boosting their own childish egos,” Assistant United States Attorney Kathryn Warma told the court, according to a press release. “The callous disregard of the dangers posed to others, as well as the arrogance and recklessness displayed by these, and other hackers in committing such crimes should be considered by the Court as a factor that weighs in favor of a significant prison sentence.”

Bad-mother-fucker.org
Bad-mother-fucker.org

corner2Another website that was hosted by “Russell Handorf” aka Satanklawz.

SatanKlawz

Satanklawz hosts all the servers, and does mostly all the technical stuff.

Title: Chief of Security
Joined Badmotherfucker: 7/26/00
Sex: A Man
Age: 2/19/80
Hometown: Memphis, TN
Philly2600.net
Philly2600.net

2014-10-23 23_09_03-Philadelphia 2600_More Information

The Philadelphia 2600 was set up to gather people with a common intrest to represent a stereotyped culture, share knowledge, and have a good time. Everybody at the meetings has something to teach, no matter how new to computers, and everybody has something to learn, no matter how experienced. We ask everyone to keep an open mind at the meetings because even within our group there is diversity. The Philadelphia 2600 was set up for anybody with any electronic and computer intrest, not just “Hackers”. If you’re a graphic artist, come on down. If you’re a cable repair guy, come on down. If you’re a 10 year old midget with a 2X4 for a leg, come on down. If you’re a police officer or government official, you’re welcome too. As for everyone else, you’ll always find someone who’s willing to teach new members and this is the perfect place to do it.

This site was one of Russell Handorf’s old websites from 2001.  He went by satanklawz.

Adrian Lamo and FBI Cyber Squad computer scientist Russell Handorf
Adrian Lamo and FBI Cyber Squad computer scientist Russell Handorf

10/18/12 Update: 2006 posting at forum - where Russell Handorf still contributes using his "grey hat hacker" handle "satanklawz" - suggests he has been working for FBI three years earlier than his resume claims; Adrian Lamo admits being "friends" with Handorf but still won't answer any real questions; Chet Uber offers to have Lamo "interview" me - Neal Rauhauser, who claims he has nothing to.....
Exploits Online by Tau
Exploits Online by Tau

exploits

Welcome to Tau’s AOL Exploits site. Here you will find up to date information on the great things you can do on AOL that are not officially supported by AOL along with other online goodies.

With so many people on AOL with so many people trying to more AOL exploits I encourage all of you to send me your screen shots, e-mails, or Instant Messages having to do with anything funny, interesting, or plain stupid. All credit will be given to you.

AOL Warez Arise Group
AOL Warez Arise Group

2014-10-22 13_29_16-1264410_10105281608895370_5920015541346424548_o - Windows Photo Viewer

http://www.AriseWarez.com

Arise Macro Created by X99

glassyabout_arise

 

About Arise Warez

A long, long, time ago, hehe, I was in a group called DGG. GaL ran the group and eventually I ran it as well. Unfortunately for me I learned the hard way when a person other then yourself controls the site as well as the bots, well you got problems. GaL decided she wasn’t going to be involed with the group anymore and yanked the site. Well Arise was born that day. I borrowed a botnet and got a T-3 release site. First mistake: using a borrowed botnet. Ok so I got a few bots, Second mistake: Never have anybody but yourself be botmaster. Well eventually I learned bots and the group Arise flourished. One small problem was we were an AOL group but had no AOL presence. Chemical came on board and changed all that. Arise has seen members come and go, usually to see them start there own warez group. Hehe, I see more warez groups that have former Arise members and it amazes me, and I wish them all the BesT. Some say now we’re the best, the only true 0day group left. Well that is a nice complement. Ya know nothing lasts forever, but while its happening I say 0-Day Everyday!!
-Evil, Founder Of Arise

AOL Warez Badbyz
AOL Warez Badbyz

What is BadByz? BadByz is an America Online based mp3 and movie distribution group How do I obtain the service BadByz offers? You must have an America Online account and enter the private chatroom "badbyz". Then use the server. If you do not know what a server is or how to use it please look at the tutorials section of this website. Why does BadByz.....