MR Tokens


The following numbers are MR tokens for use with AOL. If you have the right equipment (which many don't), you can use these to go directly to a conference room. Some of these tokens lead to staff-only rooms, however, these can STILL be accessed by non-staff. 1    Town Hall 3    Classroom 4    The OGF Commons 5    Writers Workshop 6-8  Classroom 9    Geoworks Chat Room 10  .....

IRC Hack


Hacking IRC – The Definitive Guide

Copyright 1996 klider@panix.com Welcome to Hacking IRC- The Definitive Guide. The purpose of this page if you have not already guessed is to provide what I consider optimal methodology for hacking IRC channels. In addition, I provide some of the better channels to hack as well as fun things to do while “owning a channel.”

Contents

Section 1— Why Hack IRC?

Section 2–Requisite Tools

Section 3–What It Takes To Gain Control

Section 4–Link Looker(LL)

Section 5–Bots and Scripts

Section 6–Multi-Collide-Bot(MCB)

Section 7–Pre-Takeover Preparation

Section 8–Thing To Do ONce You “Own” the Channel

Section 9–Best Channels to Hack

The Hackers Handbook [Read Me]


T H E H A C K E R ‘ S H A N D B O O K
Copyright (c) Hugo Cornwall

All rights reserved

First published in Great Britain in 1985 by Century Communications Ltd

Portland House, 12-13 Greek Street, London W1V 5LE.

Exploring Historical & Emerging Phishing Techniques

Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.

Netcat 1.10


Netcat 1.10=========== Netcat is a simple Unix utility which reads and writes dataacross network connections, using TCP or UDP protocol.It is designed to be a reliable "back-end" tool that canbe used directly or easily driven by other programs andscripts. At the same time, it is a feature-rich networkdebugging and exploration tool, since it can create almostany kind of connection you would need and has severalinteresting.....

Digital5k.com

Digital5k.com

aol progz… a digital throw back to AOL, 1995.

one of the main reasons that i decided to recreate my digital5k.com website was the constant memories of the AOL progz days.  i won’t lie, there are redundant reminders of my AOL/visual basic (vb)/C++ childhood.  it was a great time in life and the internet, if you ask me.  let’s start off by how it all caught my attention and obsession… ascii art – which doomed my future and solidified my career in computers, programming, development and marketing.

2014-10-25 10_14_23-aol progz… a digital throw back to AOL, 1995.

yep, ascii art was the one little element that attack my attention span and made me say ‘whoa, that’s pretty cool’.  better known in those days as scrollers or macros.  a macro is simple font characters put together to form a type of pre-digital art.  i’ll never forget the first time i signed into AOL and say that beautiful scroll ascii art by ao-hell.

AOHellSplashScreen (1)

i was in 6th grade.  who knows how old i was, i don’t feel like doing the math.  i had just moved to the hell hole known as _____ from Houston, Texas.  i had no friends.  i knew nobody.  i just wanted to go home.  since Texas schools let out a few weeks earlier, i had some time to kill.  a very dangerous thing for a teenager.  what is a borderline anti social teen to do in a city with no friends?  go on the internet with the elite speed of 56 bits per second.

for those of us who remember, AOL was very… fucked.  the horrible chatrooms, stupid interface, laggy system and overall confusing nature, yet – it’s all we had.  the internet was a different place back in 1995.  images of a woman’s breasts were downloaded one pixel line at a time.  often stopping right above the nipple or right below the belly button.  there were no scams, very little spam, limited advertising and an innocence that can never be restored.  the internet was the preacher’s virgin daughter that was just getting ready to leave home, go off to college and get fucked, hard.

it took 3-4 attempts to connect to AOL back then, i would go on to later know the swift backdoor, alternate numbers and general brute force attacks that would prioritize my place in dial up line.  once you gained a stable connection, it was a release of endorphins that no drug has been able to reignite in my brain.  it was instant freedom.  no reality, no physical or gravitational limits, nobody to answer to.  it was an open digital playground with visual basic as monkey bars and the rush of adrenaline for swings.  it was a beautiful feeling for a child at the age of 12 with no real world experience.

finally,  you’re logged into AOL and you’re at the horrible start screen.  let’s go to a chatroom and see what’s popping.  ASL?  remember that?  jesus christ, why do i?  i must have been in a basketball related chatroom when i saw the very thing that would literally go on to change my life.  for the best.  a fucking scrolling advertisement for an aol prog known as ao-hell in an ascii format.

when i saw the 2 line scroll in a basketball chatroom i was first intrigued and then a bit shocked.  my initial thought was, what the hell is this?  i had no idea what it was, but i knew i needed it.  i needed to own it.  i needed to download it.  i needed to run this application.  just by the name, i knew it was something i would appreciate.
aol25_940x700-300x211

i started to IM the person who had ran this ao-hell prog.  the username?  that, too i will never forget – da chronic.

after 10-20 ignored IM’s i finally got an email.  a bit confused, i checked out the email.  it was blank.  cocksucker.  but wait, there’s an attachment?  aohell32.exe?  this must be the prog i’ve seen advertised.  without caution, i download and run it… and with that, my career choice is altered in a very dramatic way.

wait, a tool that i can use to flood emails? scroll and flood chatrooms?  boot people offline and cause all kinds of general hell and annoyances?  this is what i want.  this is what i need – this is what i want to make.  however, before i even thought about how/what it took to make one, i needed to study them all.  i cannot honestly tell you how many hours i spent in my bedroom over the next 2 years downloading, running, studying and then networking with the AOL progs and their programmers.  a few huge ones stick out for some reason for me;gothic nightmares, fate zero, millennium, pepsi, havok, ao-hell and the prophecy trilogy by unab0mber.