Exploring Historical & Emerging Phishing Techniques
Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.

Inside-AOL.com
Inside-AOL.com

2014-10-24 00_06_19-Welcome To The Insider.

 

intro3

Inside-AOL was started in 1998.

If you have already read the disclaimer and agree with it you may enter here.
 
Some artwork, logos, and information are Copyright 1997, America Online, inc. ALL Information on this site is legal in its original content. This site is legal under U.S. fair use copyright law, which states anyone can use copyrighted materials in criticism, review, or parody. Use of AOL artwork and screen shots are used in the content of criticism of America Online’s service and security. This site does not wish to encourage any illegal activity.
 
Inside-AOL is a private operation, My Internet Service Provider is not responsible for ANYTHING found on this site. If you have questions or comments about Inside-AOL, you must contact the webmaster.
If you Agree, Click to enter Inside-AOL
Adrian Lamo and FBI Cyber Squad computer scientist Russell Handorf
Adrian Lamo and FBI Cyber Squad computer scientist Russell Handorf

10/18/12 Update: 2006 posting at forum - where Russell Handorf still contributes using his "grey hat hacker" handle "satanklawz" - suggests he has been working for FBI three years earlier than his resume claims; Adrian Lamo admits being "friends" with Handorf but still won't answer any real questions; Chet Uber offers to have Lamo "interview" me - Neal Rauhauser, who claims he has nothing to.....
FEDERATION GREETER’S GUIDE [Doc]

**>> FEDERATION GREETER'S GUIDE 96.09.30 TOS SECTION

HOW TO DEAL WITH TOS PROBLEMS

It's a sad fact that part of your job is to act as a Fed Cop and stop people
from offending against TOS or the Federation Policy. Greeters are the first
line of action when someone starts misbehaving, and, except in very serious
cases or when you are very busy, generally Hosts won't intervene until you
ask them to bump or lock someone.

Please do not be afraid to pass a problem player to a Host to deal with. If
you give someone a TOS warning, and they ignore it, there's usually not much
point giving them another warning - they need to be bumped out of the game as
a wake-up call, or locked out completely.
ACK Tunneling Trojans

ACK Tunneling Trojans

– Arne Vidstrom, arne.vidstrom@ntsecurity.nu
Summary

Trojans normally use ordinary TCP or UDP communication between their client and server parts. Any firewall between the attacker and the victim that blocks incoming traffic will usually stop all trojans from working. ICMP tunneling has existed for quite some time now, but if you block ICMP in the firewall you’ll be safe from that. This paper describes another concept, that I call ACK Tunneling. ACK Tunneling works through firewalls that don’t apply their rule sets on TCP ACK segments (ordinary packet filters belong to this class of firewalls).

Netcat 1.10

Netcat 1.10=========== Netcat is a simple Unix utility which reads and writes dataacross network connections, using TCP or UDP protocol.It is designed to be a reliable "back-end" tool that canbe used directly or easily driven by other programs andscripts. At the same time, it is a feature-rich networkdebugging and exploration tool, since it can create almostany kind of connection you would need and has severalinteresting.....
Hacker defender v0.7.3

Hacker defender v0.7.3====================== Main---- Hacker defender v0.7.3 byHoly_Father <holy_father@phreaker.net> & Ratter/29A <ratter@atlas.cz>Copyright (c) 2000,forever ExEwORxbirthday: 10.01.2003home: http://rootkit.host.skBetatesters:ch0pper <THEMASKDEMON@flashmail.com>phj34r (sandstorm99@ziplip.com)ierdna (ierdna@go.ro)UnixDied Hacker defender is rootkit for Windows NT 4.0, Windows 2000 and Windows XP.Main code was written in Delphi 6. New functions are written in assembler.Backdoor and redirector clients are coded mostly in Delphi 6. program uses adapted LDE32LDE32, Length-Disassembler Engine, 32-bit, (x) 1999-2000 Z0MBiEspecial edition.....
Words from [JDE]

>> JDE Productions 2002/2003 ------ PW LIST INFO------ > the 1-3 digit pw list is usless! the minimum aim\aol pw must be 4 characters. > the 4 digit pw list... what can i say, some peeps have them! there the peeps that cant remember long numbers! > the 5 digit pw list might come to good use. some peeps use there 5 digit zip code.....
You Might Be from AOL if…
You Might Be from AOL if…

YOU MIGHT BE FROM AOL IF.... (a compiled list) ... If you ever once hid your phone bill from your parents. ... Someone says "I got TOS'd," and you know they don't mean their salad. ... If you knew Solarwinds had nothing to do with sun or weather patterns. ... You've seen some pretty disturbing sets of genitals.(and helped spread em) ... If you hated.....
KoRn v1 [Read Me]

KoRn by }{ellRazor
E mail me at IVI31337IVI@hotmail.com
Greetz to: SoDx and 420 – SiC, Hades, CLUE
Goto 420’s site at http://come.to/420
420 membas
e d i t420
dagga42o
PepsiX420
Mr Bake420
flex 42o
Hadesis42o
Shaggz42o
IDOIPIE42o
soap 42o
AiMx42o
XxSiCxX
IxHR 420xI – im me

mp3 pimp v1 [Read Me]

mp3 pimp v1 by caloric Hey! Thanks for downloading my program. I made this with help from d0pey - http://www.punknboards.com/d0pey Alright, first off you have to put your handle(name, nickname, etc). You can do that by typing .handle yourhandle in an aol chat room. Next, you have to pick a directory either do that by typing .setdir c:\windows\yourmp3directory or by clicking the Directory button on.....