Portal:AOL-Files/Articles: Difference between revisions

From NINA Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 11: Line 11:
Understand that all of the screen name exploits as well as the other major exploits and loop holes are inactive unless otherwise stated. All of these are intended to teach you about AOL's flaws and past exploits.
Understand that all of the screen name exploits as well as the other major exploits and loop holes are inactive unless otherwise stated. All of these are intended to teach you about AOL's flaws and past exploits.


== Screen Name Information ==
== Screenname Information ==


Creating Fake Accounts by Cam0
[[Portals:AOL-Files/Articles/Creating Fake Accounts|Creating Fake Accounts]] by Cam0
: Another method of creating fake accounts using a new feature of AOL.
: Another method of creating fake accounts using a new feature of AOL.
Suspended Screen Name Exploit by Cam0
[[Portals:AOL-Files/Articles/Suspended Screenname Exploit|Suspended Screenname Exploit]] by Cam0
: This exploit allows anyone with a suspended account and password can turn that deactivated name into an AOL account.
: This exploit allows anyone with a suspended account and password can turn that deactivated name into an AOL account.
 
[[Portals:AOL-Files/Articles/Deleted Screenname Exploit|Deleted Screenname Exploit]] by Cam0
: Learn how to turn deleted AIM accounts into AOL accounts.
[[Portals:AOL-Files/Articles/AIM Jacking on Macintosh Systems|AIM Jacking on Macintosh Systems]] by Tau
: How AIM names are being stolen by a loophole in the AOL 2.7 client on Macintosh systems and Hypah's action with it.
[[Portals:AOL-Files/Articles/Indents and AIM Stealing|Indents and AIM Stealing]] by BMB
: The greatest AIM exploit that there has every been discovered by BMB for use on PCs. In this article he lays out step by step how to make indented screennames and how to steal any AIM screenname.
[[Portals:AOL-Files/Articles/Restricted Screennames|Restricted Screennames]] by Tau
: Also called the r2k exploit, this exploit allowed regular AOL members to make screennames with restricted strings in them like Host, Guide, AOL, etc. This was done via a flaw in free.aol.com.
[[Portals:AOL-Files/Articles/Restricted Screennames via keyword Names|Restricted Screennames via keyword Names]] by Tau
: Hours after AOL added a new feature to its screenname creation process that allowed users to choose words to assemble a screenname, a new exploit was discovered that allowed users to make screennames with restricted strings after the 10th character of a screenname.





Revision as of 02:00, 2 October 2020

 
AOL-Files Articles Downloads FDO91

All of these articles have been written by members of the AOL underground for this site or have given us permission to post their work here. All of the information is accurate to the best of our knowledge. However, if you notice an error in any of the articles please contact the webmaster (webmaster@fdo-files.com) and let us know.

Submit Your Own

Want to write an article? We would love it! After being reviewed by the staff your article would be posted on the main page and all the site's visitors would see it. If you are just beginning on AOL but you know something interesting or have some special skill and you want to get your reputation started then this is a good way to do it.

Status of the Exploits

Understand that all of the screen name exploits as well as the other major exploits and loop holes are inactive unless otherwise stated. All of these are intended to teach you about AOL's flaws and past exploits.

Screenname Information

Creating Fake Accounts by Cam0

Another method of creating fake accounts using a new feature of AOL.

Suspended Screenname Exploit by Cam0

This exploit allows anyone with a suspended account and password can turn that deactivated name into an AOL account.

Deleted Screenname Exploit by Cam0

Learn how to turn deleted AIM accounts into AOL accounts.

AIM Jacking on Macintosh Systems by Tau

How AIM names are being stolen by a loophole in the AOL 2.7 client on Macintosh systems and Hypah's action with it.

Indents and AIM Stealing by BMB

The greatest AIM exploit that there has every been discovered by BMB for use on PCs. In this article he lays out step by step how to make indented screennames and how to steal any AIM screenname.

Restricted Screennames by Tau

Also called the r2k exploit, this exploit allowed regular AOL members to make screennames with restricted strings in them like Host, Guide, AOL, etc. This was done via a flaw in free.aol.com.

Restricted Screennames via keyword Names by Tau

Hours after AOL added a new feature to its screenname creation process that allowed users to choose words to assemble a screenname, a new exploit was discovered that allowed users to make screennames with restricted strings after the 10th character of a screenname.