The AOL Protocol

The AOL Protocol

The AOL Protocol

When you hear the phrase “The AOL Protocol”, I bet most of you immediately think of FDO, right?
Although FDO is a part of the AOL protocol, it in no way encompasses the big picture. When I use
the term “The AOL protocol”, I refer to how the AOL client and server interact with each other,
how data is prepared, how it is sent, and how it can be manipulated.

There currently exists no formal documentation of the AOL protocol, or at least one that is
publicly available. For this reason, I have taken it upon myself to strip the bits of
information from my feeble mind and write a document with at least basic information about
the AOL protocol. The information included in this document is what I have learned, from
exploration, help from others, and just stumbling upon it. I in no way guarantee the accuracy
of the information contained herein. That said, here is what I know.

AOL Keywords and Backdoors


Subj:      ²«UnderGround»²²«MaFia»²(Aol Secret Keywords & Back Doors)

Date:      97-07-17 17:03:05 EDT

From:     AlphaLocks

To:          BeAwareX1

 

–•´)´)´)•– Soylent Green Warez Server v4.32 by Elroy –•(`(`(`•–

–•´)´)´)•– Download the latest copy here! –•(`(`(`•–

Inside Warez Part 1

Inside Warez Part 1

Subj:      Fwd: º^º^( InSide WaReZ Issue #2 (Part 1)^º^º

Date:      97-07-27 15:21:53 EDT

From:     SPYER2000

To:          BeAwareX1

 

 


Forwarded Message:

Subj:      º^º^( InSide WaReZ Issue #2 (Part 1)^º^º

Date:      97-07-27 14:35:28 EDT

From:     BuBBLe HoP

 

«–¥(TRauMaTiZeD MassMailer²·º ßy: ßaNiCKuLa)¥–»

«–¥(This one is Dedicated to TaSHa, BaNiCKuLa’s True Love!)¥–»

«–¥(This Mail took 33.61719 Seconds to send)¥–»

«–¥(There are 69 out of 73 people on the MM)¥–»

«–¥(There have been: 0 Un-Retrievable Mails on This MM)¥–»

«–¥(This is Mail Number: 6 of  19 Mails)¥–»

 

AOL Progs on Floppies

AOL Progs on Floppies

Satan Gold by Veortix and Artist, Incredible Scrambler by Vortix, mp3 chat, Swift Room Buster Turbo 4.0, Swift Room Buster 2. http://vortix.hypermart.net

Old Buddy Lists


a1m fear
accuracy
afextz
africanninjas
aim tempy
aimbionet
aimnymike
airtuh ily
almost tipsy
ambidextrism
atb
azz

Mini Oblivion


Turn Word Wrap On!!!

AppName: Mini Oblivion
Versin: 0.1
Coder: Stan
Group: The Ratpack
Website: http://oblivionrat.cjb.net

–=Disclaimer=–

Sub 7 2.1.5 [Read Me]


..::MAXIMIZE & TURN ON WORD WRAP::.. ======================== - Sub 7 2.1.5 - - coded by mobman - _ ReaDMe/Tutorial _ - by FuX0reD - [ http://www.sub7.net ] ======================== Intro: In this tutorial I, FuX0reD, will try to do as much hand-holding and will try to be as THOROUGH as possible, AND IT WILL BE IN PLAIN ENGLISH (for those people who dont know, or dislike.....

Har02.bas

Har02.bas

'Ok This is Har0 here.This is VERSION 2.0 'Of My AOL 4.0 BAS. My Last One Sucked Ass 'This one is AWESOME!. I love all the colors 'and how the bas werks!.I hope u got this from 'KNK or HIDER or Death Online. 'FOR QUESTIONS AND SHIT EMAILME AT:ItsHar0@JUNO.COM 'To get codes goto-httP://progworld.cjb.net. 'SOme shit about this bas is that 'It is used to make.....

The Hackers Handbook [Read Me]


T H E H A C K E R ‘ S H A N D B O O K
Copyright (c) Hugo Cornwall

All rights reserved

First published in Great Britain in 1985 by Century Communications Ltd

Portland House, 12-13 Greek Street, London W1V 5LE.

Early Phishing

Early Phishing

Koceilah Rekouche krekouche@pushstart.info

The history of phishing traces back in important ways to the mid-1990s when hacking
software facilitated the mass targeting of people in password stealing scams on America
Online (AOL). The first of these software programs was mine, called AOHell, and it was
where the word phishing was coined. The software provided an automated password
and credit card-stealing mechanism starting in January 1995. Though the practice of
tricking users in order to steal passwords or information possibly goes back to the
earliest days of computer networking, AOHell’s phishing system was the first automated
tool made publicly available for this purpose. 1 The program influenced the creation of
many other automated phishing systems that were made over a number of years. These
tools were available to amateurs who used them to engage in a countless number of
phishing attacks. By the later part of the decade, the activity moved from AOL to other
networks and eventually grew to involve professional criminals on the internet. What
began as a scheme by rebellious teenagers to steal passwords evolved into one of the
top computer security threats affecting people, corporations, and governments.