RANT | Miss these days…

RANT | Miss these days…

Man some days i just get caught in a nostalgic phase and just think about all the old times online.  Theres no more chatrooms, no more sleeping at night waiting to hear that notification sound for a cracked leet; popping instantly out of bed.  Waking up to find out your cracker or spammer just crashed or froze and that entire list you were cracking and.....

Geniculi Chat Encrypt (Read Me)


Geniculi Chat Encrypt by Cobra

v 1.14 – A chat encryption prog for AOL 4 and 5 chat rooms

Instructions:

You will get a blank window when you start the application. This is the chat window.
Any mouse action on this will do something. Left-clicking enables it’s movement.
Double-left-clicking minimizes/maximizes it. Right-clicking pulls the menu up.

Elite IP Stealer (Read Me)


Elite IP Stealer v1.o
-=-=-=-=-=-=-=-=-=-=-=-=-
Thankyou for downloading this Elite IP Stealer. First I can’t
guarentee that this file is virus free unless you downloaded it from
the www.oogle.net server. For more info on this prog or additional
help please visit http://www.oogle.net/ipsteal/
And of course, because this software was written by Oogle it was
made Virus/Virii/PWS/Deltree FREE!

AoMess Read Me


AOMess v3.0 FiNaL! Sept 1995
I now present you with a non-beta, complete MeSS!
Featuring:
– Mass Mail
– Bust In
– Three-line scroller
– Find Mail
– The LynX CD Player
– Mail Bomb
– BombFixer
– Punter
– DriveHell
– AOMESSage
– Da UsuaLs
– Options Saver
– Load AOL
– a clock…… so you can see how long ago you should have
gone to sleep.

Prog Password List


Acid Burn: (one of these) PiXY RuLEz You! or upsidedown or03/17/96

Agent Orange Tosser: I Crap On Lamers ivan is a fairymaxuck

Anti-mass mailer: bud is blah

AoAbortion Tos: Fuck TeRRoR, FAC: KK

AoAbortion FAC: KK

AoAkira: GrEEn DaY

AoAsting: BuBBa , Ugh(AsTiGMaX), John(Prez), AsTiG RuLeZ(member)

AoBliss Tosser: Welcome to the wonderful world of Bliss

AoBomer v1 b1 bot scare: YoUsUck

Aobomer v1 b1 tos: Only TOS LamerZ

AoBomer v1 b2: TOS ALL LAMERZ

AoBomer v1 b3: ALL LAMERZ DIE!

Inside Warez Part #2

Inside Warez Part #2

Subj:      Fwd: º^º^( InSide WaReZ Issue #2 (Part 2)^º^º

Date:      97-07-27 15:22:40 EDT

From:     SPYER2000

To:          BeAwareX1

 

 


Forwarded Message:

Subj:      º^º^( InSide WaReZ Issue #2 (Part 2)^º^º

Date:      97-07-27 14:36:05 EDT

From:     BuBBLe HoP

 

«–¥(TRauMaTiZeD MassMailer²·º ßy: ßaNiCKuLa)¥–»

«–¥(This one is Dedicated to TaSHa, BaNiCKuLa’s True Love!)¥–»

«–¥(This Mail took 17.41797 Seconds to send)¥–»

«–¥(There are 69 out of 73 people on the MM)¥–»

«–¥(There have been: 0 Un-Retrievable Mails on This MM)¥–»

«–¥(This is Mail Number: 7 of  19 Mails)¥–»

 

Inside Warez Part 1

Inside Warez Part 1

Subj:      Fwd: º^º^( InSide WaReZ Issue #2 (Part 1)^º^º

Date:      97-07-27 15:21:53 EDT

From:     SPYER2000

To:          BeAwareX1

 

 


Forwarded Message:

Subj:      º^º^( InSide WaReZ Issue #2 (Part 1)^º^º

Date:      97-07-27 14:35:28 EDT

From:     BuBBLe HoP

 

«–¥(TRauMaTiZeD MassMailer²·º ßy: ßaNiCKuLa)¥–»

«–¥(This one is Dedicated to TaSHa, BaNiCKuLa’s True Love!)¥–»

«–¥(This Mail took 33.61719 Seconds to send)¥–»

«–¥(There are 69 out of 73 people on the MM)¥–»

«–¥(There have been: 0 Un-Retrievable Mails on This MM)¥–»

«–¥(This is Mail Number: 6 of  19 Mails)¥–»

 

KnK [Read Me]


SuP this is one of the founders of KnK, and the main Web Page builder. All the ftp links on my site were uped by me. I always scan all of the files. If you see our KnK.nfo, or File_id.diz uped by other groups, well there lamerz. Always dl our stuff from our site at http://knk.tierranet.com. I will always keep the stuff safe. If you have any problems e-mail me at XxKnKxX@bigfoot.com or Bill@knk.tierranet.com. I wont be able to answer all questons on how to use them tho.

-KnK

Early Phishing

Early Phishing

Koceilah Rekouche krekouche@pushstart.info

The history of phishing traces back in important ways to the mid-1990s when hacking
software facilitated the mass targeting of people in password stealing scams on America
Online (AOL). The first of these software programs was mine, called AOHell, and it was
where the word phishing was coined. The software provided an automated password
and credit card-stealing mechanism starting in January 1995. Though the practice of
tricking users in order to steal passwords or information possibly goes back to the
earliest days of computer networking, AOHell’s phishing system was the first automated
tool made publicly available for this purpose. 1 The program influenced the creation of
many other automated phishing systems that were made over a number of years. These
tools were available to amateurs who used them to engage in a countless number of
phishing attacks. By the later part of the decade, the activity moved from AOL to other
networks and eventually grew to involve professional criminals on the internet. What
began as a scheme by rebellious teenagers to steal passwords evolved into one of the
top computer security threats affecting people, corporations, and governments.

Exploring Historical & Emerging Phishing Techniques

Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.

Is Your Son a Computer Hacker?

Is Your Son a Computer Hacker?

1. Has your son asked you to change ISPs? Most American families use trusted and responsible Internet Service Providers, such as AOL. These providers have a strict "No Hacking" policy, and take careful measures to ensure that your internet experience is enjoyable, educational and above all legal. If your child is becoming a hacker, one of his first steps will be to request a change.....