PPN – Concepts of Echelon by Phonetap – November 07, 1999

PPN – Concepts of Echelon by Phonetap – November 07, 1999

The Phone Punx Network Presents
–Phone Punx Magazine–
—-Issue three—-
“We are the phony in telephony”
November 07, 1999
Last Updated: November 07, 1999
http://fly.to/ppn
(Mirror: http://worship.to/ppn)
phonepunx@yahoo.com

Contents

~Intro by Mohawk

~Beginners Guide to the DACS, Part One by BitError

~CallerID: Up close and Personal by hatredonalog

~DATUs – The Tool of the New Age Phreak: Part II by MMX

~Frequency Counters by Black Axe

~An Overview of Trunked Radio Systems by Black Axe

~A different newbie guide by Mohawk

~Notes on ANI by Suess

~Voice Over IP Surveillance with the TTC Fireberd 500 DNA.323 by Seuss

~Concepts of Echelon by Phonetap

~Cyberpunk culture by Mohawk

~Letters

Fox News – FBI Narrows Hunt in Website Attacks – February 14, 2000

Fox News – FBI Narrows Hunt in Website Attacks – February 14, 2000

NEW YORK — U.S. investigators are focusing on a handful of potential suspects in last week's attacks on major Web sites, Internet security experts and hacker sources familiar with the investigation said on Monday. As experts traced the Web site blitzkrieg to a virulent new software program, Tribal Flood Network, used to break into computer networks, Internet security firms raced to offer updated programs to fend…
ABC News – FAA Computers are Insecure – September 27, 2000

ABC News – FAA Computers are Insecure – September 27, 2000

 The Federal Aviation Administration skips key background checks on workers, leaves open known security holes, doesn’t even use passwords sometimes and has inadequate firewalls, the report says.      The air-traffic control system hasn’t been successfully attacked, but at least one hacker has broken into an FAA e-mail server. And a year after identifying holes in one FAA system, contractors found the agency had not fixed…
ICQ Visual Basic

ICQ Visual Basic

ICQ Control Center Was Written by me Digital Vampire
translated from the mirabilis documentation and other.

the project lastest well over 6 months ————–

everything else included in this zip file was by their
respective owners. I just thought it might be nice to
be able to get everything you wanted to know from one
place, as opposed to the months of hunting the net that
I had to do.

Digital Vampire (tom pickles) – Tom_pickles@hotmail.com

ICQ : 14996057. – Enjoy 🙂

Hackers’ Excellent Adventures

by 

 
With his baby face and doughy body, 17-year-old Joshua Gilson does not look like your typical FBI quarry.

In fact, huddled over his Toshiba laptop, with rock music blaring from his bedroom stereo and Jerry Springer flickering on the TV, the Sheepshead Bay resident looks like any other teenager, albeit one experiencing maximum sensory overload, 1998-style.

But actually Gilson is part of a nationwide networkof teenage computer hackers who have stolen everything from Internet accounts to credit card numbers, a cybergang that has flourished despite a yearlong effort by the FBI to curb this online piracy, the Voice has learned. “I’ve stolen accounts and stuff like that. I didn’t even think it was that big of a deal,” Gilson said. “Everybody does it.”

For months, federal investigators have been serving subpoenas and search warrants at the homes of these young hackers, carting away computers, disks, modems, and other items as parents watch in horror. Agents with the FBI’s computer crimes squad have recently raided homes across the metropolitan area–from Brooklyn to the New Jersey suburbs–as part of a probe into wide-scale credit card fraud and other cybercrimes.

In several instances, agents visited the same residences more than once — first in mid 1997 and then again earlier this year — because some young hackers were undeterred by the federal probe. According to one court record, a hacker recently boasted to a friend that “nothing could be done to him because he was a minor.”

One federal investigator acknowledged that while “it’s tough to prosecute a juvenile,” the FBI is “not always sure you’re gonna find a teenager” at “the end of the string.” The source added, “And if you do, it still doesn’t mean the game is off, because if the damage is severe enough it is still a crime and it’s still a problem.”

Since the probe is ongoing–and every target appears to be underage —
investigators have tried to keep details of the case confidential, including whether any teenagers have been arrested on federal charges. But interviews with several subjects of the criminal inquiry and a confidential FBI document obtained by the Voice provide a detailed look at the current investigation.

The federal probe began last spring, when agents learned of the “massive deployment of a password-stealing program” on the Internet, according to the FBI document. The scheme targeted accounts on America Online (AOL), the nation’s largest online service. AOL is a favorite nesting place for young hackers, who congregate in chat rooms with names like Dead End and Island 55. “Fifteen seems to be the preferred age for an AOL hacker,” said one long-in-the-tooth 18-year-old hacker.

Kinger2000.bas

Kinger2000.bas

KingEr²ººº by søpøn you should've received this module with a text document giving you a brief description on how to use it. if you didn't, sucks to be you but it's not rocket science so use your scrolling, ieet0 caps, bas file using head to figure it out. ;P -søpøn ("Dim sopon as int@aol.com")
AOL PiMPS

AOL PiMPS

THEY'RE BACK, AND THEY'RE BETTER THAN EVER! Saturday, October 15, 2005 My goodness, I received an email recently from a long retired pimp from many years ago. The one and only CandyMan sends his regards to all the pimps who continue with the daily struggle of finding some ho's to slap around. Candy of course, being one of the founding fathers of the warez scene,…
The AOL Protocol

The AOL Protocol

The AOL Protocol

When you hear the phrase “The AOL Protocol”, I bet most of you immediately think of FDO, right?
Although FDO is a part of the AOL protocol, it in no way encompasses the big picture. When I use
the term “The AOL protocol”, I refer to how the AOL client and server interact with each other,
how data is prepared, how it is sent, and how it can be manipulated.

There currently exists no formal documentation of the AOL protocol, or at least one that is
publicly available. For this reason, I have taken it upon myself to strip the bits of
information from my feeble mind and write a document with at least basic information about
the AOL protocol. The information included in this document is what I have learned, from
exploration, help from others, and just stumbling upon it. I in no way guarantee the accuracy
of the information contained herein. That said, here is what I know.

FPipe v2.1

——————————————————————————
FPipe v2.1 – Port redirector.
Copyright 2000 (c) by Foundstone, Inc.
http://www.foundstone.com
——————————————————————————

FPipe is a source port forwarder/redirector. It can create a TCP or UDP stream
with a source port of your choice. This is useful for getting past firewalls
that allow traffic with source ports of say 23, to connect with internal
servers.

TCP\IP: A Mammoth Description

_________________________________________________________________________

TCP\IP: A Mammoth Description By Ankit Fadia ankit@bol.net.in
_________________________________________________________________________

TCP\IP or Transmission Control Protocol \ Internet Protocol is a stack or collection of various protocols. A
protocol is basically the commands or instructions using which two computers within a local network or the
Internet can exchange data or information and resources.

Transmission Control Protocol \ Internet Protocol or the TCP\IP was developed around the time of the
ARPAnet. It is also known as the Protocol Suite. It consists of various protocols but as the TCP
(Transmission Control Protocol) and the IP (Internet Protocol) are the most, well known of the suite of
protocols, the entire family or suite is called the TCP\IP suite.

The TCP\ IP Suite is a stacked suite with various layers stacked on each other, each layer looking after one
aspect of the data transfer. Data is transferred from one layer to the other. The Entire TCP\ IP suite can be
broken down into the below layers-: