Hackers and Spammers

RazoE

Boobs/Boost, my favorite
Jun 13, 2006
4,946
3
38
39
Los Angeles
www.cafepress.com
If I have the ISP of one, what can I do with it?

There's this guy I know that's been hacking people's AIM passwords, and "spam bombing"...

anyway to get the feds involved?
 

sleepy8602

Supra fiend
Mar 14, 2007
13
0
0
39
D-Town,Tx
a good way to fuck with him is:
if you know his email address
sign him up for gay porn newsletters
unless he's gay then sign him for some lesbian porn newsletterz
either way he's in for a big surprise :evil2:
 

Quin

Trans killer
Dec 5, 2006
1,989
0
36
33
Columbus, IN
Evilempire1.3JZ-GTE said:
the bad @$$ hackers use wireless with reprogramed or cleaned MAC serial numbers and do this far from where they live.

Not bad ass hackers, just not script kiddies who just DL shit off the web and act like they know what their doing.
 

RazoE

Boobs/Boost, my favorite
Jun 13, 2006
4,946
3
38
39
Los Angeles
www.cafepress.com
This is an automated reply to the submission of your network abuse
incident.
Please take time to read it carefully because it provides insight to
your
reported incident and future submissions to the Comcast Network Abuse
Team.

First, we would like to thank you for bringing this matter to our
attention.
We take network abuse very seriously within the Comcast domain and we
apologize for any inconvenience this has caused you. Due to the large
number
of complaints we receive, we may not be able to respond to you again
regarding this incident. However, Comcast investigates each reported
incident of Abuse and we will take all appropriate action to warn,
suspend,
and/or terminate a subscriber that has violated Comcast's Acceptable
Use
Policy or Terms of Service. To view our Acceptable Use Policy, please
click
on the Terms of Service link at www.comcast.net and then click on the
link
for the Acceptable Use Policy.

Second, when reporting a network abuse incident to the Network Abuse
Team
you must follow the submission guidelines below to expedite the
investigation process. If you fail to follow these guidelines your
request
may not be processed or a delay may occur. We process these requests on
a
First-In-First-Out basis; prioritized by the level of network abuse a
customer is experiencing. Also, please do not submit more then one
request
per network abuse incident. This will ensure that each occurrence is
addressed in the most efficient manner possible.

Network Abuse Submission Guidelines

1.Provide a brief, general description of the network abuse incident.

2.Include all logs or information relevant to the incident, ensure the
logs
your submitting contain:
a.Date of incident
b.Time of incident and time zone
c.Source Internet protocol (IP) address or host name
d.Destination IP address or host name
e.Destination port

3.For e-mail abuse i.e. Spam, include full-unmodified header
information and
content of the email. Header information is a requirement for reporting
e-mail abuse. Without the header information, the Abuse Team cannot
determine the true originator of the e-mail and no action will be
taken. If
you are unsure how to extract a full-unmodified header, please visit
http://spamcop.net/fom-serve/cache/19.html for instructions to support
your
mail client.

4.For alleged off topic (non-spam) or commercial Usenet postings, we
also
need full un-modified headers of the Usenet posting including the body
of
the offending message. If you are unsure how to view the
full-unmodified
headers of the Usenet post, consult the help section of your newsreader
software or your news provider.

In closing, Comcast cannot investigate an incident of network abuse
without
the information requested above. Also, Comcast only investigates
incidents
of network abuse regarding Comcast subscribers. Non-subscribers should
be
reported to their appropriate ISP for network abuse resolution. Please
be
advised that Comcast does not disclose personally identifiable
information
about our subscribers except as may be required or permitted by law or
authorized by our subscribers. As a result, information pertaining to
particular subscriber(s) or specific actions taken in regard to Abuse
complaints may not be disclosed. However, Comcast is committed to
identifying alleged offenders and taking all appropriate action to
ensure
compliance with our Acceptable Use Policy and other Terms of Service.

Sincerely,

The Comcast Network Abuse and Observance Team






alrighty, I guess we're getting somewhere...


what are these, though?

c.Source Internet protocol (IP) address or host name
d.Destination IP address or host name
e.Destination port
 

RazoE

Boobs/Boost, my favorite
Jun 13, 2006
4,946
3
38
39
Los Angeles
www.cafepress.com
I got screen shots of him confessing on AIM...

does that hold any water?

spammerbx7.jpg


(im humoring him, trying to get info, and apparently it worked quite well)


a little while ago he IMed me from some girl's SN that he hacked into, so he really does do it...
 

Evilempire1.3JZ-GTE

SF what a waste of supras
Jun 22, 2006
1,382
0
0
SoCal
www.myspace.com
nope that is not grounds for termination of service really. people use weak passwords and he just brute forces a bunch of people who use dumb passwords besides no isp likes aol anyway.

hes really in no way a real hacker hes a small timer.

I thought you ment things like email spam by the crap load like mail bombing
phishing passwords through fake host sites
dispersing virus trojans worms
de-encrypting wireless to get credit card numbers identity theft fruad you know real things that even feds would like to visit him for.
 

Quin

Trans killer
Dec 5, 2006
1,989
0
36
33
Columbus, IN
Source IP address or host name you already have, you posted it earlier.
Destination IP address or host name is your external IP. If you don't know it, go here www.ipchicken.com
Destination port is what port he was trying to get in. Think of a port as a doorway, and there are 60,000 or so commonly used ones. I don't remember AIM's ports off the top of my head, sorry. The problem is, I'm pretty sure Comcast doesn't issue static IPs, so it wouldn't be the same after he shuts down and comes back on. However, since he said he leaves it on 24/7 you might get lucky. If you google "AIM+port" you'll probably find it. Good luck