RANT | Miss these days…

RANT | Miss these days…

Man some days i just get caught in a nostalgic phase and just think about all the old times online.  Theres no more chatrooms, no more sleeping at night waiting to hear that notification sound for a cracked leet; popping instantly out of bed.  Waking up to find out your cracker or spammer just crashed or froze and that entire list you were cracking and.....

AOL Invoke List


32-000105 – Create PUBLIC Room
32-002185 – The SPAM Area (Link to ARC)
32-002326 – The America Online Guide Area (JADE)
32-002411 – Change Software Version Numbers
40-005060 – Sales and Service Forum
40-009366 – Request-O-Rama
40-011549 – TOS Area (Detailed
32-000029 – Blank Mail (NF)
32-000030 – Update Welcome screen
32-000040 – Catch Hidden (NF)
32-000056 – Continue? (NF)
32-000105 – Create PUBLIC Room
32-000158 – On Stage Screen (NF)
32-000270 – Untitled Auditorium (NF)
32-000274 – Blank IM
32-000292 – Network News (NF)
32-000295 – Covers buttons
32-000296 – Uncovers Buttons
32-000300 – End of Account (NF)
32-000350 – Works for Macs
32-000351 – Microsoft Stuff
32-000754 – Send Question (NF)
32-001612 – Mercury Sign-On Screen

The AOL Protocol

The AOL Protocol

The AOL Protocol

When you hear the phrase “The AOL Protocol”, I bet most of you immediately think of FDO, right?
Although FDO is a part of the AOL protocol, it in no way encompasses the big picture. When I use
the term “The AOL protocol”, I refer to how the AOL client and server interact with each other,
how data is prepared, how it is sent, and how it can be manipulated.

There currently exists no formal documentation of the AOL protocol, or at least one that is
publicly available. For this reason, I have taken it upon myself to strip the bits of
information from my feeble mind and write a document with at least basic information about
the AOL protocol. The information included in this document is what I have learned, from
exploration, help from others, and just stumbling upon it. I in no way guarantee the accuracy
of the information contained herein. That said, here is what I know.

Early Phishing

Early Phishing

Koceilah Rekouche krekouche@pushstart.info

The history of phishing traces back in important ways to the mid-1990s when hacking
software facilitated the mass targeting of people in password stealing scams on America
Online (AOL). The first of these software programs was mine, called AOHell, and it was
where the word phishing was coined. The software provided an automated password
and credit card-stealing mechanism starting in January 1995. Though the practice of
tricking users in order to steal passwords or information possibly goes back to the
earliest days of computer networking, AOHell’s phishing system was the first automated
tool made publicly available for this purpose. 1 The program influenced the creation of
many other automated phishing systems that were made over a number of years. These
tools were available to amateurs who used them to engage in a countless number of
phishing attacks. By the later part of the decade, the activity moved from AOL to other
networks and eventually grew to involve professional criminals on the internet. What
began as a scheme by rebellious teenagers to steal passwords evolved into one of the
top computer security threats affecting people, corporations, and governments.

Exploring Historical & Emerging Phishing Techniques

Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ,Β USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.

Miley Cyrus Hacker Raided by FBI

Miley Cyrus Hacker Raided by FBI

A 19-year-old hacker who published provocative photos of teen queen Miley Cyrus earlier this year was raided by the FBI Monday morning in Murfreesboro, Tennessee.

The hacker, Josh Holly, repeatedly bragged online about breaking into the Disney star’s e-mail account and stealing her photos. He also gave interviews to bloggers and others and boasted that authorities would never find him because he moved so often. [Last month, Holly contacted Threat Level seeking to have an article written about him here.]

But this morning the FBI did find him and, after talking with him for more than an hour about his exploits, served him with a search warrant and a list of items to be seized (which was posted at the hacking site digitalgangster.com after Holly showed it to a friend).

mileycyrus2

 

Chizam

Chizam

Chizam Chat Spammer Created by sano dark@reapers.org  

Hackers Run Wild and Free on AOL


Using a combination of trade tricks and clever programming, hackers have thoroughly compromised security at America Online, potentially exposing the personal information of AOL's 35 million users. The most recent exploit, launched last week, gave a hacker full access to Merlin, AOL's latest customer database application. As a security measure, Merlin runs only on AOL's internal network, but savvy hackers have found a way to.....

You Might Be from AOL if…

You Might Be from AOL if…

YOU MIGHT BE FROM AOL IF.... (a compiled list) ... If you ever once hid your phone bill from your parents. ... Someone says "I got TOS'd," and you know they don't mean their salad. ... If you knew Solarwinds had nothing to do with sun or weather patterns. ... You've seen some pretty disturbing sets of genitals. (and helped spread em) ... If you.....