Hackers’ Excellent Adventures


by 

 
With his baby face and doughy body, 17-year-old Joshua Gilson does not look like your typical FBI quarry.

In fact, huddled over his Toshiba laptop, with rock music blaring from his bedroom stereo and Jerry Springer flickering on the TV, the Sheepshead Bay resident looks like any other teenager, albeit one experiencing maximum sensory overload, 1998-style.

But actually Gilson is part of a nationwide networkof teenage computer hackers who have stolen everything from Internet accounts to credit card numbers, a cybergang that has flourished despite a yearlong effort by the FBI to curb this online piracy, the Voice has learned. “I’ve stolen accounts and stuff like that. I didn’t even think it was that big of a deal,” Gilson said. “Everybody does it.”

For months, federal investigators have been serving subpoenas and search warrants at the homes of these young hackers, carting away computers, disks, modems, and other items as parents watch in horror. Agents with the FBI’s computer crimes squad have recently raided homes across the metropolitan area–from Brooklyn to the New Jersey suburbs–as part of a probe into wide-scale credit card fraud and other cybercrimes.

In several instances, agents visited the same residences more than once — first in mid 1997 and then again earlier this year — because some young hackers were undeterred by the federal probe. According to one court record, a hacker recently boasted to a friend that “nothing could be done to him because he was a minor.”

One federal investigator acknowledged that while “it’s tough to prosecute a juvenile,” the FBI is “not always sure you’re gonna find a teenager” at “the end of the string.” The source added, “And if you do, it still doesn’t mean the game is off, because if the damage is severe enough it is still a crime and it’s still a problem.”

Since the probe is ongoing–and every target appears to be underage —
investigators have tried to keep details of the case confidential, including whether any teenagers have been arrested on federal charges. But interviews with several subjects of the criminal inquiry and a confidential FBI document obtained by the Voice provide a detailed look at the current investigation.

The federal probe began last spring, when agents learned of the “massive deployment of a password-stealing program” on the Internet, according to the FBI document. The scheme targeted accounts on America Online (AOL), the nation’s largest online service. AOL is a favorite nesting place for young hackers, who congregate in chat rooms with names like Dead End and Island 55. “Fifteen seems to be the preferred age for an AOL hacker,” said one long-in-the-tooth 18-year-old hacker.

Padillac’s aim bump v1


#######################[yayo.org]################################### ###########[yayo.org]##################################################### ## ## ## [+] vulnerable software: aim express 7.0 ## ## [+] discovered by: pad aka padillac escobar ## ## ## ## [+] capabilities: bumping, password scrambling, account suspension ## ## [+] discovered on: 08/20/08 ## ## [+] partially patched on: 09/09/08 ## ## ## ## [+] notes: a few people have been asking for an explanation as to ## ## how i.....

Bored

Bored

You ever get sick of the internet anymore? Back in 1998-2003 I could literally just stay online for days. Pulling all nighters was easy. Jolt cola, hackers movie playing on the tube TV behind me. Log into any chat iXa, vb, phishy, cerver, island55, darkside, etc. You never knew what was going to happen that night. Were you getting pws'd? and spending your entire night.....

YTCracker.com

YTCracker.com

represent the almighty whitey cracker high ponce family history i was born on august 23, 1982 in the pimpin' socal town of la mirada, california (where, coincidentally, they made teenage mutant ninja turtle toys). i didn't hang around there for too long because my pops hated the area and wanted to head back to his home state, colorado. when i was 4, we moved from.....

The Good Old Days.

The Good Old Days.

Man 13 years old seems like forever ago. I'm not saying I was the leetest hacker out there but I knew my fair share of shit. Enough that it played an important role in my life and was one of my biggest hobbies.I still keep up to date with this site whenever I get bored. Lately its been more often these last few months. I've.....

Member Directories


Here's a list of old member dir's (mem dir) that I use to respam. prjSEX prj3chr hi9d9s TheEliteOne elight productions BlareNation smut & kei r3t4rd5 d1v1n3 sim3k 0b3s3 spr1te g4mbit 0u5t prjcopied prjBlaze[d] prjWikid.Oens 5wiss sulfur 'n trance m0e 2oo2 sizzer & ice3k omen.mikro xpl0d pahaxor Blade.3k0 TheDarkMasters Kernel32 TheDarkMasterz kw: RainMan 703hacka 404hacka phyre since 97' HackTheNation DeadNation j33t.3k

Updated Invoke Token List

Updated Invoke Token List

There are a TON of duplicates in this….. if you have a shitload of tokens and invokes that arent mixed up and no duplicates then send em to cystic@wirm.net

invokes


32-324       – Brings you to Programmers University

32-301       – Adds another mailbox to your toolz

32-987       – Software upgrade for master aol. (OH)

32-5046     –  chat room stuff

32-2327     – An Easter Egg.  Only 1 of many on AOL

32-2342     – NEA on-line

32-2405     – Test Internet Style Mail

32-2411     – Set your version of AOL

32-25         – DL manager window

32-252       – Create a screen name

32-253       – Create alternate screen name

32-254       – Delete a screen name

APM 1.0.0

APM 1.0.0

A Prepaid Mass v1.0.0 / Bulk Mailer Spam Paradise Universal Domination Submitted by Koin

AIM Away Message Buffer Overflow Exploit


/*
* AIM Away Message Buffer Overflow Exploit
* Exploit by John Bissell A.K.A. HighT1mes
*
* Exploit:
* ========
* drizzit.c
*
* Vulnerable Software:
* ====================
* – AIM 5.5.3588
* – AIM 5.5.3590 Beta
* – AIM 5.5.3591
* – AIM 5.5.3595
* and a couple others versions…
*
* If you want to try other return addressees for other versions of
* AIM then edit the return address.. But the current one embedded
* will work for sure with all the AIM versions listed above.
*
* I used some of the metasploit shellcode for this exploit with some
* modifications to get this into stealth mode so it is harder to
* detect the attack. Since I’m using metasploit shellcode that means this
* exploit can be used on any NT type OS, like win2k, winnt, winxp across
* any service pack.. I don’t know about SP2 though I haven’t tested
* it yet.
*

Who is Smokey?

Who is Smokey?

All my life I have loved computers, even as a kid when the only ones out were those apple’s (the ones wolfenstein worked with). I remember just pucnhing keys on the keyboard as if it were connected & as if I were this elite computer wizard. So in the 90’s when AOL first came out my father bought the family our first computer. I remember.....

Rant | 1999

Rant | 1999

So now its 1999 after web I dove into visual basic to learn to code my own progs.  I cant remember the person that helped me add bas files, and how to call the different subs in that module such as ChatSend. Programming in VB was different then coding websites but wasnt to far off. There was actually a ton of sources and content available......