PARADISE

VIP Member
  • Content Count

    182
  • Joined

  • Last visited

  • Days Won

    7
  • Feedback

    100%

PARADISE last won the day on December 16 2019

PARADISE had the most liked content!

Community Reputation

18 Good

1 Follower

About PARADISE

  • Rank
    Knight
  • Birthday 02/14/1988

Profile Information

  • Current Mood
    Hilarious
  • Gender
    Male
  • Country
    United States
  • Location
    San Francisco

Recent Profile Visitors

2,476 profile views
  1. I played your game again and you won! can't beat that!
  2. Ok, one more time. Even though pdo_sqlsrv is listed in phpinfo() it doesn’t work on the majority of shared plans. Because their servers don’t support or they don’t have the correct extensions needed. Also you don’t have the permission to add extensions, so you can’t make it work. Now if you do it from IIS where you can actually install the extensions yourself it will work. Do you understand ? Check https://paradised.icu/test.php
  3. I tried to explain, but I’m not gonna play your game. You are free to believe what ever you want to believe. You won.
  4. You don't really get what i just said, or you try to prove your mental disability? I said even-though PDO is listed in phpinfo() it doesn't actually work. Now why you post about pdo_mysql, I don't really know.
  5. In the beginning I thought the same thing @Rootware, that it’s useless because you can use phpinfo() or check the configuration through cpanel/plesk. I currently have some hosting plans on Namecheap. Even thought they mention php7.x I had to use this particular script to figure out that pdo_sqlsrv is not working under their servers. Even their support wasn’t aware of that either.
  6. Windows server 2008 and also sql server 2008. What files are you planning on using?
  7. I haven’t used Knex.js ,so I can’t help you here. But like every other query builder it should have its own documentation
  8. I had the same issue with frameworks and query builders and so on. This is how I managed to insert the encrypted password. The encrypted password from L2Crypt.js should look like this: 0x256891DE63C270EDD8416767AA301616 . Then you insert this using CONVERT inside user_auth CONVERT(BINARY(16), '$pass', 1) And for the answers of the security questions (answer1 & answer2 inside user_auth) CONVERT(BINARY(32), '$answer1', 1)
  9. You have to decompile ai.obj and check the quest there.
  10. I don’t think you can find the original formula unless you dig enough with IDA, or get an idea from C1 since @MasterToma has already his own c1 sources
  11. You do it while we are on skype, I’ll set it up later when I go to my office. If you are successful you get your reward. Don’t worry
  12. It’s not. You started it by talking about exploits while you don’t even have the knowledge to reproduce them. It hasn’t been touched for 6 years. Of course it’s old and not safe to use. For testing purposes is perfect and especially for this guy right here. End of discussion for me.