The Anonymity Tutorial

The Anonymity Tutorial

The Anonymity Tutorial / written by yours truly, R a v e N (blacksun.box.sk)<=============================================================================> version 1.5, 22/3/00 Note: whenever you see something like this: blah(1) it means that if you don't understand the meaning of the word blah there's an explanation for it just for you, located on the newbies corner on section 1.Note 2: if you're having a hard time reading this page because.....

Warez Group Envy

Warez Group Envy

Huge thanks to Nugem for submitting all these images and documents on the Warez Group Envy. EnvyISO Members Nugem . HaCkZ . PhEaRu . Keegin Butt . BUSTED . Mazin . DrangonZ . Blo0Ba11z . Nut GameZ . Wolfbane . 007 . PCMike . Next . DC . Scooby plantholt . aehbon . Nihilist Envy Greets DeFt0nEz . Eins . GameZ . WoW . Surge.....

[.nfo] BBQ Bruhs

[.nfo] BBQ Bruhs

Game Info & Release Notes: This game comes in PAL Multi5 which means you can play it in 5 language!!! Ok now you can choose it at English, German, French, Spanish, Italian! but fuck! Do you think so I do? So shut up!!! ShiT! Nothing got ripped, but you need a 80 min CD-R to burn it! BBQ Bruhs are: Sausage Harry - Chicken Fried.....

PPN – Concepts of Echelon by Phonetap – November 07, 1999

PPN – Concepts of Echelon by Phonetap – November 07, 1999

The Phone Punx Network Presents--Phone Punx Magazine------Issue three----"We are the phony in telephony"November 07, 1999Last Updated: November 07, 1999http://fly.to/ppn(Mirror: http://worship.to/ppn)phonepunx@yahoo.com Contents ~Intro by Mohawk ~Beginners Guide to the DACS, Part One by BitError ~CallerID: Up close and Personal by hatredonalog ~DATUs - The Tool of the New Age Phreak: Part II by MMX ~Frequency Counters by Black Axe ~An Overview of Trunked Radio Systems by.....

Olaf.Punted.Net

Olaf.Punted.Net

Found an old website from Olaf through Archive.Org a lot of the data is gone but most of the news stories are still available. Website URL:  http://olaf.punted.net Wednesday/July/18/2001 - - puntme  hi mom.   Wednesday/July/18/2001 - now you die. - puntme i updated the funny section, you go now Monday/July/16/2001 - 16496 25366 - puntme hey, i think i updated something.. but its hard to tell anymore. but really ive been surfing the.....

Inside Warez Part 1

Inside Warez Part 1

Subj:      Fwd: º^º^( InSide WaReZ Issue #2 (Part 1)^º^º

Date:      97-07-27 15:21:53 EDT

From:     SPYER2000

To:          BeAwareX1

 

 


Forwarded Message:

Subj:      º^º^( InSide WaReZ Issue #2 (Part 1)^º^º

Date:      97-07-27 14:35:28 EDT

From:     BuBBLe HoP

 

«–¥(TRauMaTiZeD MassMailer²·º ßy: ßaNiCKuLa)¥–»

«–¥(This one is Dedicated to TaSHa, BaNiCKuLa’s True Love!)¥–»

«–¥(This Mail took 33.61719 Seconds to send)¥–»

«–¥(There are 69 out of 73 people on the MM)¥–»

«–¥(There have been: 0 Un-Retrievable Mails on This MM)¥–»

«–¥(This is Mail Number: 6 of  19 Mails)¥–»

 

Extracting Web Server Information using Telnet


Extracting Web Server Information using Telnet / by R a v e N
<===========================================================>
http://blacksun.box.sk

Welcome to yet another BSRF tutorial. This time, I will teach you most basic command in the HTTP protocol, and how it is possible to extract tons of web server information and other pieces of info using this command only and a telnet client.

Okay, you are about to learn what your browser does when you type in, say, blacksun.box.sk. First of all, it connects to blacksun.box.sk on port 80. If there is an answer on the other hand, which means that the port is open (the port is not closed or blocked by any filtering software, such as a firewall) and a TCP session can start, your browser would usually type this:
get url HTTP/1.1
(followed by a blank line)

Local Windows hacking for newbies


.-‘____________|______
| |
| Your computer |
| is dead… |
| and it was so alive | Local Windows hacking for newbies
| _______ |
| |.—–.| | Written by MiggyX for the Black Sun Research Facility
| ||x . x|| |
| ||_.-._|| | Contact : miggyx@amicoders.demon.co.uk
| `–)-(–` |
| __[=== o]___ | Coming together is a beginning, Staying together is
| |:::::::::::|\ | progress, Working together is success!
| `-=========-`() |
| You shouldn’t have |
| installed: |
| |
| -= Win’95 =- |
`———————`

Exploring Historical & Emerging Phishing Techniques

Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.

AIM Clone [Read Me]


***PUT ON WORD WRAP IF NOT ON!*** Anyway, thanks for downloading yet another annoying version of the 'cloned' AIM. This is for the new Beta AIM version 2.01.1056 with file transfer capabilities. It will allow you to run a total of five AIM clients (exe's) at once. That means five names. That means being really annoying if you want to. Ah well...I made it again.....