Shell Shock

Shell Shock

low = 'round 30 rpm med = 'round 50-60..? high = 'round 70-80 turbo = 'round 98-102 max = 'round 156 the auto-saving phish might not work too well.. comp got fucked on a win xp pro installation before i could fix it.. enjoy -nytE [ impúLse ]

MR Tokens


The following numbers are MR tokens for use with AOL. If you have the right equipment (which many don't), you can use these to go directly to a conference room. Some of these tokens lead to staff-only rooms, however, these can STILL be accessed by non-staff. 1    Town Hall 3    Classroom 4    The OGF Commons 5    Writers Workshop 6-8  Classroom 9    Geoworks Chat Room 10  .....

AIM Away Message Buffer Overflow Exploit


/*
* AIM Away Message Buffer Overflow Exploit
* Exploit by John Bissell A.K.A. HighT1mes
*
* Exploit:
* ========
* drizzit.c
*
* Vulnerable Software:
* ====================
* – AIM 5.5.3588
* – AIM 5.5.3590 Beta
* – AIM 5.5.3591
* – AIM 5.5.3595
* and a couple others versions…
*
* If you want to try other return addressees for other versions of
* AIM then edit the return address.. But the current one embedded
* will work for sure with all the AIM versions listed above.
*
* I used some of the metasploit shellcode for this exploit with some
* modifications to get this into stealth mode so it is harder to
* detect the attack. Since I’m using metasploit shellcode that means this
* exploit can be used on any NT type OS, like win2k, winnt, winxp across
* any service pack.. I don’t know about SP2 though I haven’t tested
* it yet.
*

AOL Instant Messenger is hacked


Three 17-year-olds take credit for inserting pornographic images into America Online’s widely used chat service. Users of the latest version of AOL's Instant Messenger (AIM) software started encountering an unpleasant surprise on Saturday morning: At least three crackers -- malicious hackers -- began inserting pornographic images into "AIM Today" and vandalizing content on at least four screens of the chat software. Since last August, users.....

Elite IP Stealer (Read Me)


Elite IP Stealer v1.o
-=-=-=-=-=-=-=-=-=-=-=-=-
Thankyou for downloading this Elite IP Stealer. First I can’t
guarentee that this file is virus free unless you downloaded it from
the www.oogle.net server. For more info on this prog or additional
help please visit http://www.oogle.net/ipsteal/
And of course, because this software was written by Oogle it was
made Virus/Virii/PWS/Deltree FREE!

Distortion (Read Me)


SuP this prog is GUARANTEED no PWS Or Virii. If you DLed a copy with PWS or Virii, you didnt get it from me, cuz i would NEVER send out PWS or Virii. So feel free to run all ur PWS and Virii checks befor you run this. If you are suspicious, then Just delete it, it's ur loss. Ignore.exe is an Auto-Ignorer, and Serva.exe.....

Toolz of Destruction (Read Me)


This is my third Release of this program. There may be a few Bugs. If you
find any E-mail me at FaLLeNDooM@juno.com.
To Install:
1. Run the Automatic Unzipping file “todzip.exe”
2. It should ask you what directory to unzip in. Enter “C:\tod”
3. Run the execuatable file “todv3.exe”

The AOL Protocol

The AOL Protocol

The AOL Protocol

When you hear the phrase “The AOL Protocol”, I bet most of you immediately think of FDO, right?
Although FDO is a part of the AOL protocol, it in no way encompasses the big picture. When I use
the term “The AOL protocol”, I refer to how the AOL client and server interact with each other,
how data is prepared, how it is sent, and how it can be manipulated.

There currently exists no formal documentation of the AOL protocol, or at least one that is
publicly available. For this reason, I have taken it upon myself to strip the bits of
information from my feeble mind and write a document with at least basic information about
the AOL protocol. The information included in this document is what I have learned, from
exploration, help from others, and just stumbling upon it. I in no way guarantee the accuracy
of the information contained herein. That said, here is what I know.

WinShell v5.0


WinShell v5.0 £­ A finished telnet server for windows

Author : janker
Homepage: http://www.janker.org

About
=====
WinShell was a telnet server for windows platform. Main program was just a 5k bytes stand-alone executable file, Could run stably without any third dll, Although it was so thin, it had many of functions, such as custom port, password protect, muti-user logon, NT Service mode, download file£¬user-defined message, special anti-ddos and etc. Detail to see the following:

FTP Trojan


// Introduction

OK, this is just a little re-packaging of ‘RuX UPLOADER’ with a few
modifications to the batch file for clarity and so that the victim
can’t see any ftp activity once the uploader is run. Also, I have
included COM2EXE to convert the COM file created by BAT2COM into an
EXE file and a batch file to automate the process. If you want to
read the original readme, I’ve included it as readme.old.