Jump to content

bonesaw

Members
  • Posts

    311
  • Credits

  • Joined

  • Last visited

    Never
  • Feedback

    0%

Everything posted by bonesaw

  1. Probably a proxy and force your client through it. I wouldn't trust it as it could possibly be unsafe leading to account stealing. I'm not saying it will happen, but if you want to do it yourself, you should get a trusted proxy and do it on your own. It's impossible to change someone's IP without doing something as proxy/vpn/tunnel, which is just a redirection of your network traffic through somewhere else. I'd lock this thread... if I could. :P
  2. It's always near the url, it's in the id=YOURACCOUNT part of the url... sockwrite -n $sockname GET /vote/?id=YOURACCOUNT HTTP/1.1 var %string account= $+ $urlencode(YOURACCOUNT) $+ &x= $+ $urlencode($rand(10,60)) $+ &y= $+ $urlencode($rand(10,40)) %sk Referer: http://account.frintezza.com/vote/?id=YOURACCOUNT'>http://account.frintezza.com/vote/?id=YOURACCOUNT These are the 3 cases.. use find to make it easier :P or in the vote command add something like this: set %accname youraccount and then change the YOURACCOUNT for: sockwrite -n $sockname GET /vote/?id= $+ [ %accname ] HTTP/1.1 and in this case: var %string account= $+ $urlencode( $+ [ %accname ] $+ ) $+ &x= $+ $urlencode($rand(10,60)) $+ &y= $+ $urlencode($rand(10,40)) And last: %sk Referer: http://account.frintezza.com/vote/?id= $+ [ %accname ] Too lazy... ;D heh, funny how I contribute and lose my gold membership... plus my karma went poof, nice, really nice. not like I care anyway... haven't been active lately since I didn't had much to contribute with. gl hf
  3. Sockets. When you open a website, you open a socket to it with your browser. You can do the same with IRC. You can even open websites, login on forums, read stuff... even use google, just with sockets. mIRC is very powerful for a chat program. ;D
  4. Hey. So, I was playing on a server on which you could get rewards for voting on them in some sites. The thing is... how will they know you voted on 'em to give you points to then trade for rewards? Well, they don't. Once you click in the shortcut on their website, you'll get the point, no need to vote. This server used "L2 Account ZS - by zdark" as accounting manager and voting/rewarding manager. I know I could've wrote it in C or Delphi but I felt lazy. I've made a perl version but it's harder to use. So I just used mIRC instead. Yes, it's a mIRC script, you must have it running in order to leave it running. Since I almost never turn off my pc, I just leave it on and voting... You can vote from 12 to 12 hours, the script does that. Also, you can vote 4 times (in my case). I will post this because I quit this server and probably will be quitting L2 (for what, the 5th time) for a while. This has been made for Frintezza server, feel free to edit it to your own purposes and maybe to other systems with rewarding. This has been done using a sniffer (Network Chemistry Packtyzer 5.0), mIRC and some knowledge of HTTP and sockets. Change the YOURACCOUNT on the script. I know, I could've made a constant for that but I felt lazy, since it has been made for myself. You have to change it in 3 different places. How to use: Install mIRC - download here After that, open the "script editor" (it's a "/a" green icon in the toolbar) and go to Remote tab. Paste the script in there, click OK. Type /vote and wait a little. Maybe you will have to be online on irc in any server, I'm not sure. Wait for the messages of voting... Check if you increased your voting points. Obs: If you have more than one computer and they have different IP addresses, you may run in multiple PCs. So if you can vote 4 times every 12 hours to get 4 points, you then get 8 points every 12 hours, with two voting machines... and so on. Own experience: I had 3 voting machines. Bought a few hats and enchants with votes. For low rate servers, this must be godly. For that reason, I consider this an exploit, even though it's not any ingame exploit, it makes you get items. Have fun using it. ;v4 alias fz { sockclose frintezza | .timer -o 1 3 sockopen frintezza account.frintezza.com 80 } alias fzend { echo -a $timestamp %fzs Closing remaining sockets... done! } alias vote { .sockclose frintezza .sockclose getfrintezza .sockclose cookiefz .sockclose fakevote .set %fzs [FZ] .sockopen cookiefz account.frintezza.com 80 .timer -o 1 $rand(5,8) .sockopen getfrintezza account.frintezza.com 80 .set %fz 2 .timer -o 1 $rand(10,20) .fz .timer -o 1 $rand(30,40) .fz .timer -o 1 $rand(50,60) .fz .timer -o 1 $rand(70,80) .fz .timer -o 1 $rand(100,110) sockclose getfrintezza .timer -o 1 110 fzend .timer -o 1 44000 vote } alias urlencode { var %a = $regsubex($$1,/([^\w\s])/Sg,$+(%,$base($asc(\t),10,16,2))) return $replace(%a,$chr(32),$chr(43)) } on *:sockopen:getfrintezza:{ sockwrite -n $sockname GET /vote/?id=YOURACCOUNT HTTP/1.1 sockwrite -n $sockname Host: account.frintezza.com sockwrite -n $sockname User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.8) Gecko/2009032609 Firefox/3.0.8 sockwrite -n $sockname Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 sockwrite -n $sockname Accept-Language: en-us,en;q=0.5 sockwrite -n $sockname Accept-Encoding: gzip,deflate sockwrite -n $sockname Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 sockwrite -n $sockname Keep-Alive: 300 sockwrite -n $sockname Connection: keep-alive ; Cookie verify if ($exists(fz_cookie.txt)) { var %n = 1, %cookie while ($read(fz_cookie.txt,%n)) { ; Seperate the cookies with ';' %cookie = $+(%cookie,$v1,;) inc %n } ; Sending the cookie sockwrite -n $sockname Cookie: %cookie } sockwrite -n $sockname $crlf } on *:sockopen:frintezza:{ var %string account= $+ $urlencode(YOURACCOUNT) $+ &x= $+ $urlencode($rand(10,60)) $+ &y= $+ $urlencode($rand(10,40)) var %sk sockwrite -n $sockname if (%fz > 5) { echo -a [ $+ $asctime(hh:nn:ss) $+ ] %fzs Vote $+ %vt $+ .php doesn't exist! Error! Halting... | halt } %sk POST /vote/vote $+ %fz $+ .php HTTP/1.1 %sk Host: account.frintezza.com %sk User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.8) Gecko/2009032609 Firefox/3.0.8 %sk Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 %sk Accept-Language: en-us,en;q=0.5 %sk Accept-Encoding: gzip,deflate %sk Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 %sk Keep-Alive: 300 %sk Connection: keep-alive %sk Referer: http://account.frintezza.com/vote/?id=YOURACCOUNT ; Cookie verify if ($exists(fz_cookie.txt)) { var %n = 1, %cookie while ($read(fz_cookie.txt,%n)) { ; Seperate the cookies with ';' %cookie = $+(%cookie,$v1,;) inc %n } ; Sending the cookie %sk Cookie: %cookie } ;Force connection close: sockwrite -n $sockname Connection: close %sk Content-Type: application/x-www-form-urlencoded %sk Content-Length: $calc($len(%string)+1) %sk $crlf %string ;vote2, 3, 4 e 5 if (%fz == 2) { var %vt lineage2.top100arena.com } if (%fz == 3) { var %vt www.xtremetop100.com } if (%fz == 4) { var %vt www.topgamesites.net } if (%fz == 5) { var %vt www.mmorpgtoplist.com } echo -a [ $+ $asctime(hh:nn:ss) $+ ] %fzs Voting in %vt (vote $+ %fz $+ .php) $+ ... .timer 1 1 sockvote %vt inc %fz } alias sockvote { sockclose fakevote | sockopen fakevote $1 80 } on *:sockopen:fakevote:{ if (top100arena isin $1) { var %path /in.asp?id=15088 } if (xtremetop100 isin $1) { var %path /in.php?site=1132237733 } if (topgamesites.net isin $1) { var %path /lineage2 } if (mmorpgtoplist isin $1) { var %path /in.php?site=15217 } sockwrite -n $sockname GET %path HTTP/1.1 sockwrite -n $sockname Host: $1 sockwrite -n $sockname User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.8) Gecko/2009032609 Firefox/3.0.8 sockwrite -n $sockname Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 sockwrite -n $sockname Accept-Language: en-us,en;q=0.5 sockwrite -n $sockname Accept-Encoding: gzip,deflate sockwrite -n $sockname Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 sockwrite -n $sockname Keep-Alive: 300 sockwrite -n $sockname Connection: keep-alive sockwrite -n $sockname $crlf } ;grab-cookie on *:sockopen:cookiefz:{ sockwrite -n $sockname GET /myaccount/ HTTP/1.1 sockwrite -n $sockname Host: account.frintezza.com sockwrite -n $sockname $crlf } on *:SOCKREAD:cookiefz:{ sockread %tmp if ($regex(%tmp,/^Set-Cookie: (.+?)=(.+?);/i)) { ; We found a cookie, let's store it echo -a [ $+ $asctime(hh:nn:ss) $+ ] %fzs New cookie found! if ($read(fz_cookie.txt, w, $regml(1) $+ =*)) { ; Cookie already exists, overwriting... echo -a [ $+ $asctime(hh:nn:ss) $+ ] %fzs Replacing old cookie with new one... write -l $+ $readn fz_cookie.txt $+($regml(1),=,$regml(2)) } ; else we will just add it to the end echo -a [ $+ $asctime(hh:nn:ss) $+ ] %fzs Storing new cookie... else write fz_cookie.txt $+($regml(1),=,$regml(2)) } sockclose cookiefz }
  5. The "exploit" is in the \n. That's a dev code to break a string and go to a new line. Problem with this is you'd get with this string: hey\nDude2: Hey... Dude: Hey! Dude2: Hey... So it's easy to detect the fake. You may trick noobs with this, but I wouldn't even consider it an exploit.
  6. I don't agree with this thing at all, plus it's NOT related to Lineage at all. It's just a regular attack, a very simple one. Not even distributed or spoofed, a weak attack. Sorry but I'm locking this, it has nothing to deal with L2 at all, just regular DoS, any website could fall for this. Want to make your own attack tools? Learn perl or mod some scripts from packetstorm... If any mod don't agree with me, feel free to del my post & unlock it.
  7. Wrong section. Use search, it's good for your health. http://www.maxcheaters.com/forum/index.php?topic=32574.0 Locked.
  8. Search before you post. Already posted. http://www.maxcheaters.com/forum/index.php?topic=39593.0 Locked.
  9. Nice share indeed, although there's a similar post including Kamael / Hellbound login screen as well. Locking and requesting a move to right section.
  10. 1. Useless spam 2. Old topic 3. This has posted in the wrong section, it's not an exploit 4. Locked as it's been dead for a while anyway 5. Even locked, if any mod see this, please move it to client mods section or something..
  11. Locking as requested. May still work on other Interlude servers (buff stack, not CHP ofc) though. :)
  12. So you mean the "new" fire.dll (2mb file) is actually nophx.dll itself? I thought fire.dll pointed to Fyyre's nophx.dll which would then be executed. Nothing is unbreakable. The 2mb fire.dll file is protected by Themida. Once someone unpacks it, then we'll have some more info. Too bad my skills aren't good enough to break it yet, although I've managed to dump it using IDA (olly/windasm/others just close, that's a known Themida behaviour). Never say something is impossible...
  13. Lineage II uses MS SQL database, if you hack into it, you can do whatever you want with the server, even kill it if you want to. If the admin has any knowledge of security, he will have separate machines for DB and gameserver, the DB will never be open to the internet and will always remain on the LAN, only being accessed by the gameserver.... althought, many just buy some hosting, configure some L2 server and goes "omg join my servah!!", while leaving it all open, that's your chance to go in, hack it and have fun killing his server (almost always ends up like that). If you don't have enough SQL query or management knowledge, well, it won't be quite useful. Having the right tools and the access is not enough to exploit anything at all. :)
  14. And this shouldn't be in this section. Should be at client mod section...
  15. Well.. if you google for "inurl:i-search.php dropcalc" you'll find a few servers using it... ;) Not gonna try it, I don't like L2J servers anyway... but a few servers still use it, maybe it'll still work..
  16. That's ancient. Just check the release date. 2007-01-31 Plus, it's for very specific L2J servers with a web server that will allow SQL injection. Too specific exploit... don't think it's gonna work anywhere. For a successful SQL injection, you must craft your own queries, those c/p stuff won't work unless it details on which application this is used for and what version... very, very specific.
  17. Wrong section indeed. No rights to move, so I'll lock it until someone moves it to avoid spam.
  18. Locked as requested, plus, not working.
  19. It's very old and it used to work, may still work on some servers. Since the last posts been only "good" "thx" etc, locking up...
  20. Already posted. Wrong info on servers, works only for L2J @ Kamael CT1 as informed above. Locked.
  21. Okay then, wrong section (you said it by yourself it's not an exploit) and no info about it. Closed.
  22. Ok, make a decent thread at least. Explain what it does, how it does and everything else. And please learn how to write. Posting a binary and/or sourcecode of something people don't even know what's for, makes no sense and is risky, reason why people are flaming you.
×
×
  • Create New...