https://doxbin.com/upload/ISPFUCKAnoldie
part 1 was posted previously here is part 2
  _____  ______ _____ _____  _____ _______ _____            _____    ______ _    _  _____ _  __
 |  __ \|  ____/ ____|_   _|/ ____|__   __|  __ \     /\   |  __ \  |  ____| |  | |/ ____| |/ /
 | |__) | |__ | |  __  | | | (___    | |  | |__) |   /  \  | |__) | | |__  | |  | | |    | ' / 
 |  _  /|  __|| | |_ | | |  \___ \   | |  |  _  /   / /\ \ |  _  /  |  __| | |  | | |    |  <  
 | | \ \| |___| |__| |_| |_ ____) |  | |  | | \ \  / ____ \| | \ \  | |    | |__| | |____| . \ 
 |_|  \_\______\_____|_____|_____/   |_|  |_|  \_\/_/    \_\_|  \_\ |_|     \____/ \_____|_|\_\
                                                                                               
            It's about time all these skids get new methods to fuck up
            Spread this around to all faggots.

            Shoutout to #LizardSquad ;)
            Shoutout to #TeaMp0isoN


            Compiled by Francesco Mola the God :D

                                
________________________________________________________________________________________________________________________________________

1and1:
Phone #: +18774612631

HLT        |        hotline.ocis-tool.1and1.com (Intranet)
        |        Used for all Billing inquiries. Able to see all information on account, including Financial information.
SSC        |        Different Account/Domain Lookup Tool
    
General Employee Login: https://login.extranet.1and1.com/        |        inside.1and1.org
    Tool Portal. Launch HLT/SSC/Diagnostic Tools from here.
    
Research Tool: research.ocis-tool.1and1.com        //        Search by First/Last Name, Phone #. Brings UP OLD ACCOUNTS TOO! - Tells UID, Email Address, Phone #

Misc Tool URLs/Shit:
http://owa2.extranet.1and1.com/
http://rootserver.hotlinetool.schlund.de/
http://issue.tool.1and1.com/
ssestat.ocis-tool.1and1.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Call 1&1. Select #3 for Server Support.
Talk to the agent, tell them to look up a domain in HLT, since you're having trouble.
Ask them for the UserID that comes up.
Then ask for the Name, Email, Address, and call back number.
Then ask if they payed via Paypal or a using a Credit Card.
If by CC, they can see the last 4 of the CC, try the Guess and Check method.
If by Paypal, it's either thier email address on file, or a different one. Agents can see this!

To get a account, you need:
3 Pieces of Personal information:
> UserID(Handle)
> Name on file
> Email address on file
> Address
> Phone Number

1 Piece of Financial Information:
> Last 4 of CC on file
> Paypal email

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Employees.

Hosting Support Employee's have Employee ID Numbers, other centers/supports do not. All other employees just have a Username/Password for the Dashboard.
UserIDs are in this format: 6 Digits, followed by a dash (-) then 2 digits. These 2 digits correspond with what call center they are in.

*Employee's Give out Their FULL NAMES!* Always ask for a location for ddoxes.

All employees have access to the general employee dashboard. Check link above.
Theier login username is the first letter of their first name, followed by thier full last name.

Employee IDs:
Name: Jovis Lumatat                //        Hosting Support
UserID: 131125-05
Employee Username: jlumatat

Name: Joesph Swan                //        Server Support
ID: jswan

Name: Chuck Ward                //        Server Support
Username: cward

Name: Steve Umberger            //        Sales
EID: sumbgerger
Location: Virgina

Name: Aldwin Luya                //        Sales
EID: aluya

Name: Cleiford Ray Conchas
EID: CC28

Name: Gene Hatton
Location: PA. Birwin.
username = ghatton
password = Gene2468101214


Inside.1and1.org ~ Breached! 

Landing Page: http://prntscr.com/55es7w
iComm: http://prntscr.com/55eslq
System: http://prntscr.com/55etyn
Customer Service: http://prntscr.com/55eu6q
Defense: http://prntscr.com/55euda
Tools:
    InsideNET: http://prntscr.com/55eukr
    Project: http://prntscr.com/55eunv
    Development: http://prntscr.com/55euqu
    System: http://prntscr.com/55euwa
    Customer: http://prntscr.com/55ev05
    CRM: http://prntscr.com/55evm6
    Quality: http://prntscr.com/55evp4
    Customer Service: http://prntscr.com/55evw4
    Defense: http://prntscr.com/55ew1i
    Backstage: http://prntscr.com/55ew4a
Employee Profile: http://prntscr.com/55exlt

________________________________________________________________________________________________________________________________________

Network Solutions:
Phone #: 1-888-642-0209

IWS            //        Domain Lookup/Access
CSR            //        Domain and SSL Certification
AGAK        //        BMS lookup on the 8th tab

Employee IDs:

Name: Vance 
EID: 105665
Location: Spokam

Name: Sarah
EID: 011
Location: PA

[
IWS ~ Breached:
    Main Page: http://prntscr.com/59hlpq

CSR Tools ~ Breached:
    Main Page: http://prntscr.com/59hlmj
        Search Options: http://prntscr.com/59hm7k
]

Name: Christopher Poole
Email: netsol@4chan.org     //        
What is ur grandfathers occupation: 88T801z3fK
what is ur library card number: Pq6796Z83u
(517)491-6269        //        Fake #
ID: lz78qpnm49

worldstarthiphop.com
Lee Odenat
What was ur childhood nickname: Triple

kohls.com
Kohls Internet Tech Support
What fav place to visit as child: lake wawasee
what was ur dream child as a child: pilot
Reference Number: 2318160

roblox.com
Robloxguy@hotmail.com
SECQ 2314064841 : fourteen4

Miley Shane / Miley Shay
What was ur childhood phone #: 3639
What was the name of ur first school: Sydney
What is your role: npr admin 2013
What company is this: npr

UserID: 
Gabriel Van Engel
Valve Corporation
Phone #: 

________________________________________________________________________________________________________________________________________

Web.com:
Phone #: 1-800-338-1771

CTS        //        Ticketing System. Used to find and pull up Accounts
IWS        //        Same as Network Solutions
CSR        //        Same as Network Solutions
SupportPlace

________________________________________________________________________________________________________________________________________

HostGator:
Phone #: 1.866.96.GATOR

Internal Tool        //        Used to lookup all Billing details on a domain.
    https://is.internal.hostgator.com/

________________________________________________________________________________________________________________________________________

GoDaddy:
Phone #: 1-866-463-2339

C3 Hub        //        Employee Who.is Database Lookup
    x.co/c3hub

CRM    Lynx    //        Main Employee Billing Tool. Cannot look into account, without customers PIN Number or Last 8 of CC.

Transfer Concierge        //        View a domains current status as well as it's history within our system

Outlook Email/Hosted Exchange Support Tool         //        View a customers Outlook EMail account. Help troubleshoot errors

Other/Misc Tools:

Password Generator
Event Viewer
ToolZilla
Email Tool
FTP Troubleshooting Flow
DNS STuff
    Login Name: team_sapphire
    Password: boked8
Browser Troubleshooting Tool
PKI/Dream Design ChatTelecom Incidents
Login Timer Unlock    -    Unlock accounts that are login timer locked
ATS CPR (Common Problem Resolver)
ATS Chat
Reggie - Troubleshooting a domain
IP Unblock - Ublock any IP that is blocked by the system
BigFoot Jr - Determines what Nameservers should be used
Go Daddy Auctions
Known Error Database
AIR Dashboard

CRM Lynx ~ Breached
    Lookup Page: http://prntscr.com/591h9v
    Other Tools/Settings: http://prntscr.com/591hyd

________________________________________________________________________________________________________________________________________

FastDomains:
Phone #: (888) 210-3278

CPM        //        Can see all account information + Who.is    |    Accessed via Employee BlueHost ToolBar.
    
________________________________________________________________________________________________________________________________________

Domain.com:
Phone #: 800-403-3568

CSFE    //        Main Lookup Tool. Can see anything on account. Manage plans, give hosting/etc.
    http://admin.enduranceoss.com/csfe/general.html
Polaris    //        Employee Tool for tickets/status

CSFE:General ~ Breached!
    Main Page/Lookup: http://prntscr.com/59431s
        Search By: http://prntscr.com/5943uk
    Admin Page: http://prntscr.com/5943a6
    Polaris: http://prntscr.com/5943dm
    Employee Settings: http://prntscr.com/5943kk
    Billing Tools: http://prntscr.com/5944kg
    Technical Tools: http://prntscr.com/5944gk

    Lookup on Customer: http://prntscr.com/59441s
        Current User Information: http://prntscr.com/59446w

________________________________________________________________________________________________________________________________________

eNom.com
Phone #: 425-274-4500        //        Not Toll Free :(

Requires VCC, with at least $1 on it.
Buy VCC from: http://openvcc.com/
eNom DOES NOT KEEP LOGS OF CC#s USED!

1.     Email eNom, that you purchased a domain (domain name etc.) on the registering date on Who.is. Tell them that it was recently hijacked, and you do not know what to do.
    In the email, say that the person who hijacked the domain also threatened you, he said he will kill your family and burn your house down.
2.     Make sure you ask them to change the Who.is information on the domain, so the hijacker will not be able to get to you. They will comply.
3.     Afer a day, send them another email, with the receipt for the domain. Include, the new name for the domain and CC#s etc.
4.     They will email you back, asking for CC#. Give them to them. They will charge you $0.95 fee for being jews.
5.    After 24 hours, they send you the domain information.
    

________________________________________________________________________________________________________________________________________

Corporate Domains:

Employee Login Panel: https://my.cscglobal.com/cscportal/login.pwd
    Option: UCC, MySOP
/user/LeafyWasHere