37x Forum  
Zurück  > >

Portal Forum Registrieren Hilfe

 
Themen-Optionen Thema bewerten Ansicht
Alt 17.10.2003, 19:48   Direktlink zum Beitrag - 1 Zum Anfang der Seite springen
Neuer Benutzer
 
Registriert seit: 02.07.2003
Beiträge: 0
Abgegebene Danke: 0
Erhielt 0 Danke für 0 Beiträge
Standard

Aus dem myg0t forum von "Psychobud" wer immer das ist :/

PsychoBud
scr1pt k1dd1e


Joined: Sep 2003

sniffing passwords isn't the only way to get admin on a server....there's always making buddy enough with an admin that he'll accept files from you via ICQ or AIM, and trojaning him...

but there are multiple ways around ancrypted passwords and sharing exceptions...

simplest method I've found for stealing a logfile is to play the game from a networked machine with the sierra folder marked as a shared resource...then the client machine can download the file from the machine that's connected to the game, whether it's in use or not.

as for encrypted passwords...depends on how they did it...MOST admin set it up using the default encryption engine in amxmod or adminmod....solution is to "listen" for someone to log in via HLSW (no encryption there), to get rcon PW....then alter the rcon by adding youself through HLSW and command line adding...or, if you know how, you can run the encryption algorythm included in the mod on your machine, and reverse engineer it..then you plug in an encrypted PW, and it spits out the unencrypted, sort of.....

anyhow...the easiest way is, as I said, to network two machines together, and join your victim server..stay there as long as it takes for an admin to show up using rcon level accesses, then "go afk" for a round, and have the second machine "jack" the logfile from the game-connected machine.


the nicest thing about this method is you can be a complete moron, and manage it, as long as you have two functional machines available, one of which is capable of running CS...they don't even have to be "officially networked"...one method I've used is to deliberately infect my gaming machine with a trojan server that I've passworded, and "secured" as much as a trojan server can be...then put both machines online, navigate the "client" machine to my sierra folder, and start gaming...Beast is WONDERFUL for this type use, since it's VERY easy to remove the beast server from your machine via regedit and manual deletion.

if you don't have two machines available, there's always the "buddy system"....team up with someone, just like when you're ghosting, infect the "player" with the trojan, log in to his machine, and have him start going to servers and raging...as soon as an admin shows up, and starts making threats, you start grabbing copies of the logfile as fast as you can download them, saving them under different names...that way you're certain to get at least ONE valid copy containing a password, encrypted or not.

I've had days where a partner and I did nothing but roam server to server deliberately getting one of us banned so the other could collect logfiles....out of 30 or so servers we'd get banned from, we'd get maybe 5 to 10 clear rcon passwords...but once we had those passwords, HLSW, and some command knowledge of the mod in use, we'd add ourselves as top level admin using the text commands and HLSW...then we'd remove/ban all the other admin, change rcon PW, and pull all sorts of other shit on them....
Report Post | IP: Logged
Maren ist offline  

Mit Zitat antworten
 


Forumregeln
Es ist Ihnen nicht erlaubt, neue Themen zu verfassen.
Es ist Ihnen nicht erlaubt, auf Beiträge zu antworten.
Es ist Ihnen nicht erlaubt, Anhänge hochzuladen.
Es ist Ihnen nicht erlaubt, Ihre Beiträge zu bearbeiten.

BB-Code ist an.
Smileys sind an.
[IMG] Code ist an.
HTML-Code ist aus.
Trackbacks are aus
Pingbacks are aus
Refbacks are aus



Alle Zeitangaben in WEZ +2. Es ist jetzt 18:50 Uhr.


Powered by vBulletin