AOHell
   HOME

TheInfoList



OR:

AOHell was a Windows application that was used to simplify ' cracking' (computer hacking) using
AOL AOL (stylized as Aol., formerly a company known as AOL Inc. and originally known as America Online) is an American web portal and online service provider based in New York City. It is a brand marketed by the current incarnation of Yahoo (2017â ...
. The program contained a very early use of the term
phishing Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious softwar ...
. It was created by a teenager under the
pseudonym A pseudonym (; ) or alias () is a fictitious name that a person or group assumes for a particular purpose, which differs from their original or true name (orthonym). This also differs from a new name that entirely or legally replaces an individua ...
Da Chronic, whose expressed motivation was anger that child abuse took place on AOL without being curtailed by AOL administrators.


History

AOHell was the first of what would become thousands of programs designed for hackers created for use with AOL. In 1994, seventeen year old hacker Koceilah Rekouche, from Pittsburgh, PA, known online as "Da Chronic", used
Visual Basic Visual Basic is a name for a family of programming languages from Microsoft. It may refer to: * Visual Basic .NET (now simply referred to as "Visual Basic"), the current version of Visual Basic launched in 2002 which runs on .NET * Visual Basic (cl ...
to create a toolkit that provided: a new DLL for the AOL client, a credit card number generator, email bomber, IM bomber, Punter, and a basic set of instructions. It was billed as, "An all-in-one nice convenient way to break federal fraud law, violate interstate trade regulations, and rack up a couple of good ol' telecommunications infractions in one fell swoop". When the program was loaded, it would play a short clip from
Dr. Dre Andre Romelle Young (born February 18, 1965), known professionally as Dr. Dre, is an American rapper and record producer. He is the founder and CEO of Aftermath Entertainment and Beats Electronics, and previously co-founded, co-owned, and ...
's 1993 song " Nuthin but a G Thang". Most notably, the program included a function for stealing the passwords of America Online users and, according to its creator, contains the first recorded mention of the term "
phishing Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious softwar ...
". AOHell provided a number of other utilities which ran on top of the America Online client
software Software is a set of computer programs and associated documentation and data. This is in contrast to hardware, from which the system is built and which actually performs the work. At the lowest programming level, executable code consists ...
. Though most of these utilities simply manipulated the AOL interface, some were powerful enough to let almost any curious party anonymously cause havoc on AOL. The first version of the program was released in 1994 by hackers known as The Rizzer, and The Squirrel.


Features

* A fake account generator which would generate a new, fully functional AOL account for the user that lasted for about a month. This generator worked by exploiting the
algorithm In mathematics and computer science, an algorithm () is a finite sequence of rigorous instructions, typically used to solve a class of specific Computational problem, problems or to perform a computation. Algorithms are used as specificat ...
used by credit card companies known as the
Luhn algorithm The Luhn algorithm or Luhn formula, also known as the " modulus 10" or "mod 10" algorithm, named after its creator, IBM scientist Hans Peter Luhn, is a simple checksum formula used to validate a variety of identification numbers, such as credit ca ...
to dynamically generate apparently legitimate
credit card A credit card is a payment card issued to users (cardholders) to enable the cardholder to pay a merchant for goods and services based on the cardholder's accrued debt (i.e., promise to the card issuer to pay them for the amounts plus the o ...
numbers. The account would not be disabled until AOL first billed it (and discovered that the credit card was invalid). The generator could also generate fake addresses and phone numbers, resembling on their surface legitimate personal information. One example of a fake account generator was a
Macintosh The Mac (known as Macintosh until 1999) is a family of personal computers designed and marketed by Apple Inc., Apple Inc. Macs are known for their ease of use and minimalist designs, and are popular among students, creative professionals, and ...
One-click based piece of software called Fake Maker written by a user known as McDawgg within the AOL Macwarez community. This software ran in parallel with the AOL program to create fake accounts based upon generated legitimate credit card account numbers. This software ultimately released 3 versions and helped to create thousands of fake accounts before AOL weakened its ability through more expedient account verification. *
Phishing Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious softwar ...
tools. The program included a "fisher" tool in 1995 that enabled hackers to steal passwords and credit card information through automated social engineering. The program would barrage random AOL users with instant messages like: * A punter ( IM-bomber), which would send malicious Instant Message(s) to another user that would sign them off. * A mail bomb script which would rapidly send e-mails to a user's inbox until it was full. * A flooding script that would flood a chat room with
ASCII art ASCII art is a graphic design technique that uses computers for presentation and consists of pictures pieced together from the 95 printable (from a total of 128) characters defined by the ASCII Standard from 1963 and ASCII compliant chara ...
of an offensive nature, such as
the finger In Western culture, "the finger", or the middle finger (as in giving someone the (middle) finger, the bird or flipping someone off) is an obscene hand gesture. The gesture communicates moderate to extreme contempt, and is roughly equivalent i ...
or a toilet. * An 'artificial intelligence bot', which did not really contain
artificial intelligence Artificial intelligence (AI) is intelligence—perceiving, synthesizing, and inferring information—demonstrated by machines, as opposed to intelligence displayed by animals and humans. Example tasks in which this is done include speech re ...
, but had the ability to automatically respond to a message in a
chatroom The term chat room, or chatroom (and sometimes group chat; abbreviated as GC), is primarily used to describe any form of synchronous conferencing, occasionally even asynchronous conferencing. The term can thus mean any technology, ranging from ...
upon identification of keywords. (For example, a 'profane language' autoresponse was built into the program.) * An IM manager, which provided facilities to automatically respond to or block IMs from certain users. * A Steve Case cloak, which allowed users to pose as AOL founder
Steve Case Stephen McConnell Case (born August 21, 1958) is an American businessman, investor, and philanthropist best known as the former chief executive officer and chairman of America Online (AOL). Case joined AOL's predecessor company, Quantum Computer ...
in chat rooms.


Motives and legacy

The existence of AOHell and similar software even allowed AOL to develop its own
warez Warez is a common computing and broader cultural term referring to pirated software (i.e. illegally copied, often after deactivation of anti-piracy measures) that is distributed via the Internet. Warez is used most commonly as a noun, a plural ...
community.
Lurking In Internet culture, a lurker is typically a member of an online community who observes, but does not participate. The exact definition depends on context. Lurkers make up a large proportion of all users in online communities. Lurking allows use ...
in secret
chat rooms The term chat room, or chatroom (and sometimes group chat; abbreviated as GC), is primarily used to describe any form of synchronous conferencing, occasionally even asynchronous conferencing. The term can thus mean any technology, ranging from ...
with names such as 'AirZeraw', mm, cerver, 'wArEzXXX', g00dz, 'punter', 'gif', 'coldice', 'GRiP', and 'trade', AOHell created
bots The British Overseas Territories (BOTs), also known as the United Kingdom Overseas Territories (UKOTs), are fourteen territories with a constitutional and historical link with the United Kingdom. They are the last remnants of the former Bri ...
, often referred to as 'servers', which would send out a list of warez ( illegally copied software) contained in their mailbox. Simply messaging the bot with the titles of the desired software packaging would result in those packages being forwarded to one's mailbox. Since the data merely had to be copied into another user's mailbox (while still residing on an AOL server), the piracy was only limited by how fast messages could be forwarded, with AOL paying for all the cost of the bandwidth. One additional limitation included an allotted number of email messages which could be sent per day by a particular user account. Botters were able to circumvent this limitation by signing up for a white-list account which was subjected to an unknown probationary period where AOL administrators monitored the account. The existence of software like AOHell provided a parallel 'lite' version of the hacker underground that had existed for years before, based around
bulletin board system A bulletin board system (BBS), also called computer bulletin board service (CBBS), is a computer server running software that allows users to connect to the system using a terminal program. Once logged in, the user can perform functions such as ...
s. Programs like AOHell played an important part in defining the '
script kiddie A script kiddie, skiddie, kiddie, or skid is an unskilled individual who uses scripts or programs developed by others, primarily for malicious purposes. Characteristics In a Carnegie Mellon report prepared for the U.K. Department of Defense in 2 ...
', a user who performs basic cracking using simple tools written by others, with little understanding of what they are doing. These types of programs had a tendency to have AOL accounts banned; and so most users were logged on to accounts they had acquired illicitly, either by
phishing Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious softwar ...
or a fake account generator. In the manual, the creator of AOHell claims that he created the program because the AOL administrators would frequently shut down hacker and warez chatrooms for violation of AOL's terms of service while refusing to shut down the
pedophilia Pedophilia ( alternatively spelt paedophilia) is a psychiatric disorder in which an adult or older adolescent experiences a primary or exclusive sexual attraction to prepubescent children. Although girls typically begin the process of puberty a ...
chat rooms which regularly traded
child pornography Child pornography (also called CP, child sexual abuse material, CSAM, child porn, or kiddie porn) is pornography that unlawfully exploits children for sexual stimulation. It may be produced with the direct involvement or sexual assault of a chi ...
. "Da Chronic" claimed that when he confronted AOL's TOSAdvisor about it, he was met with an account deletion: He also stated that his goal was: The program was last compatible with AOL version 2.5.


References


Further reading

*
scan
* {{cite book, title=Steal This Computer Book 3, isbn=1-59327-000-3, publisher=
No Starch Press No Starch Press is an American publishing company, specializing in technical literature often geared towards the geek, hacker, and DIY subcultures. Popular titles include '' Hacking: The Art of Exploitation'', Andrew Huang's ''Hacking the Xbox' ...
, author=Wallace Wang, date=2003-01-01, chapter=AOHell, pag
297
url-access=registration, url=https://archive.org/details/stealthiscompute0000wang


External links




Interview with Da Chronic, the creator of AOHell
Hacking (computer security) Carding (fraud)