Olaf.Punted.Net

Olaf.Punted.Net

Found an old website from Olaf through Archive.Org a lot of the data is gone but most of the news stories are still available. Website URL:  http://olaf.punted.net Wednesday/July/18/2001 - - puntme  hi mom.   Wednesday/July/18/2001 - now you die. - puntme i updated the funny section, you go now Monday/July/16/2001 - 16496 25366 - puntme hey, i think i updated something.. but its hard to tell anymore. but really ive been surfing the.....

AOL Invoke List


32-000105 – Create PUBLIC Room
32-002185 – The SPAM Area (Link to ARC)
32-002326 – The America Online Guide Area (JADE)
32-002411 – Change Software Version Numbers
40-005060 – Sales and Service Forum
40-009366 – Request-O-Rama
40-011549 – TOS Area (Detailed
32-000029 – Blank Mail (NF)
32-000030 – Update Welcome screen
32-000040 – Catch Hidden (NF)
32-000056 – Continue? (NF)
32-000105 – Create PUBLIC Room
32-000158 – On Stage Screen (NF)
32-000270 – Untitled Auditorium (NF)
32-000274 – Blank IM
32-000292 – Network News (NF)
32-000295 – Covers buttons
32-000296 – Uncovers Buttons
32-000300 – End of Account (NF)
32-000350 – Works for Macs
32-000351 – Microsoft Stuff
32-000754 – Send Question (NF)
32-001612 – Mercury Sign-On Screen

ACK Tunneling Trojans


ACK Tunneling Trojans

– Arne Vidstrom, arne.vidstrom@ntsecurity.nu
Summary

Trojans normally use ordinary TCP or UDP communication between their client and server parts. Any firewall between the attacker and the victim that blocks incoming traffic will usually stop all trojans from working. ICMP tunneling has existed for quite some time now, but if you block ICMP in the firewall you’ll be safe from that. This paper describes another concept, that I call ACK Tunneling. ACK Tunneling works through firewalls that don’t apply their rule sets on TCP ACK segments (ordinary packet filters belong to this class of firewalls).

Sub 7 2.1.5 [Read Me]


..::MAXIMIZE & TURN ON WORD WRAP::.. ======================== - Sub 7 2.1.5 - - coded by mobman - _ ReaDMe/Tutorial _ - by FuX0reD - [ http://www.sub7.net ] ======================== Intro: In this tutorial I, FuX0reD, will try to do as much hand-holding and will try to be as THOROUGH as possible, AND IT WILL BE IN PLAIN ENGLISH (for those people who dont know, or dislike.....

TCP\IP: A Mammoth Description


_________________________________________________________________________ TCP\IP: A Mammoth Description By Ankit Fadia ankit@bol.net.in_________________________________________________________________________ TCP\IP or Transmission Control Protocol \ Internet Protocol is a stack or collection of various protocols. Aprotocol is basically the commands or instructions using which two computers within a local network or theInternet can exchange data or information and resources. Transmission Control Protocol \ Internet Protocol or the TCP\IP was developed around the time of theARPAnet......

Local Windows hacking for newbies


.-‘____________|______
| |
| Your computer |
| is dead… |
| and it was so alive | Local Windows hacking for newbies
| _______ |
| |.—–.| | Written by MiggyX for the Black Sun Research Facility
| ||x . x|| |
| ||_.-._|| | Contact : miggyx@amicoders.demon.co.uk
| `–)-(–` |
| __[=== o]___ | Coming together is a beginning, Staying together is
| |:::::::::::|\ | progress, Working together is success!
| `-=========-`() |
| You shouldn’t have |
| installed: |
| |
| -= Win’95 =- |
`———————`

The Hackers Handbook [Read Me]


T H E H A C K E R ‘ S H A N D B O O K
Copyright (c) Hugo Cornwall

All rights reserved

First published in Great Britain in 1985 by Century Communications Ltd

Portland House, 12-13 Greek Street, London W1V 5LE.

Exploring Historical & Emerging Phishing Techniques

Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.

Comcast.net Hijacker Gets 4 Months

Comcast.net Hijacker Gets 4 Months

A former member of the hacker gang Kryogeniks was sentenced to four months in prison Monday for his role in a 2008 stunt that replaced Comcast’s homepage with a shout-out to other hackers.

James Robert Black Jr., 21,was known as “Defiant” when he and two other hackers hijacked Comcast’s domain name in May of 2008 — a prank that took down the cable giant’s homepage and webmail service for more than five hours, and allegedly cost the company over $128,000.

Visitors to Comcast.net had been redirected to a simple page reading “KRYOGENIKS EBK and DEFIANT RoXed COMCAST sHouTz To VIRUS Warlock elul21 coll1er seven.”

“Mr. Black and his Kryogenicks crew created risks to all of these millions of e-mail customers for the simple sake of boosting their own childish egos,” Assistant United States Attorney Kathryn Warma told the court, according to a press release. “The callous disregard of the dangers posed to others, as well as the arrogance and recklessness displayed by these, and other hackers in committing such crimes should be considered by the Court as a factor that weighs in favor of a significant prison sentence.”

Secret-Spilling Sources at Risk Following Cryptome Breach

Secret-Spilling Sources at Risk Following Cryptome Breach

Ruxpin-Vanity-Page-660x244

Secret-spilling site Cryptome was hacked over the weekend, possibly exposing the identities of whistleblowers and other confidential sources, according to a hacker who contacted Wired.com and claimed responsibility for the breach.

The hacker said two intruders from the group Kryogeniks breached the long-running site, where they gained access to a repository of secret files and correspondence. Among them, the hacker claimed, were the records of self-proclaimed WikiLeaks insiders who have been the source of several unconfirmed tips supposedly detailing internal WikiLeaks matters.

Philly2600.net

Philly2600.net

2014-10-23 23_09_03-Philadelphia 2600_More Information

The Philadelphia 2600 was set up to gather people with a common intrest to represent a stereotyped culture, share knowledge, and have a good time. Everybody at the meetings has something to teach, no matter how new to computers, and everybody has something to learn, no matter how experienced. We ask everyone to keep an open mind at the meetings because even within our group there is diversity. The Philadelphia 2600 was set up for anybody with any electronic and computer intrest, not just “Hackers”. If you’re a graphic artist, come on down. If you’re a cable repair guy, come on down. If you’re a 10 year old midget with a 2X4 for a leg, come on down. If you’re a police officer or government official, you’re welcome too. As for everyone else, you’ll always find someone who’s willing to teach new members and this is the perfect place to do it.

This site was one of Russell Handorf’s old websites from 2001.  He went by satanklawz.