Like I say in most of my articles its hard to find a new exploit, in an old feature. So When i'm looking for something to exploit, I go for the new features. In AIM 4.8 there is something called Alerts, AIM Alerts. From the AIM Alerts main page, you can login with your screenname and password. It's quick and easy. This is where AIM Password cracking can live again. Because this login does not actuly log you onto AIM,(it just refrences your s/n and password with the servers) there is no limit as to how many times you can login with the wrong password. I've tried 50+ times, and once and awhile you get an error but the next time you try it checks the login just fine. I played around with the forms on that page that are used for submitting screennames/passwords and what is submitted looks like this..
siteState=&siteId=aolAlertsProd&newSN=0&mcState=initialized&authLev=1&submitSwitch=1&triedAimAuth=y&screenname=sdfg&password=sdfgsdfg
and it's submited too...https://my.screenname.aol.com/_cqr/login/login.psp with a ? after the psp.
The only problem I have encountered, is that I get an error message when i don't submit the form from AOL's page. I think it's a localhost only failsafe, anti-suid root daemon mechanism I've been working on ways around it, but haven't found one as of yet. Thats the reason i'm releasing this to the public so soon. I want someone to figure out how to do it. Of course you could just set a VB program to load the damn webpage and submit the form, but thats ugly and not as fast as you could do it with multiple winsock connections submitting to the server.
If anyone has any ideas IM me: xNemisisx2.
(Discovered by Nemisis)