Jump to content

l2phx erotisi


Recommended Posts

  • 3 weeks later...

iparxoun diafora enchant me to fix re man...twra an kaneis ena kai s spaei paei na pei pos exei protection o server..allios sigoure4ou pos to kaneis sosta

Link to comment
Share on other sites

pitemou sto l2phx enchant eine diladi pai sto max xoris na spasi gt osa guide pouda ke ta dokimasa se servers

as poume to safe itan 11 ke to max 26 me spane sta 16

 

otan se enan server douleuei to enchant tote to oplo paei sigoura sto top

 

an douleuei kai exeis lag tote to oplo iparxei periptosi na spasei

 

an dn douleuei tote aplos kaneis esi me to phx to enchant ala iparxei periptosi to weapon na spasei kai to enchant ginete me ta rates tou server ekeini ti stigmi!

Link to comment
Share on other sites

den eiani etsi opos to fantazesai...na patas deksi klik panw st croll gia na kani  ++ kai na min spane..ayto aplos einai fast enchant....

gia na to kanei safe enchant thelis scriptaki :P

exw na soy dwso ena aplos theli na alazis kapoia packet snifer gia na poiani to safe enchant

kai na patas to /social vicrory poy tha to vris sto l2mesa an patiseis ALT + C...:P

edo einai to script.....

 

var a:array[1..100] of string;

      i,n:integer;

id,withdraw,openwh,useitem,wh,enchant :string;

begin

//Item id need to be captured.For example from UseItem packet

id:=hstr('7F 50 02 10');

useitem:=hstr('14')+id+hstr('00 00 00 00');

wh:=hstr('31 01 00 00 00')+id+hstr('01 00 00 00');

enchant:=hstr('58')+id;

//openwh need to be captured:RequestBypassToServer

openwh:=hstr('32 01 00 00 00 7F 50 02 10 01 00 00 00');

withdraw:=hstr('32 01 00 00 00')+id+hstr('01 00 00 00');

if (fromclient) and (pck=hstr('1B 02 00 00 00 ')) then

begin

buf:=withdraw;

sendtoserver;

buf:=openwh;

sendtoserver;

end;

if (fromclient) and (pck=hstr('1B 03 00 00 00 ')) then

begin

buf:=useitem;

sendtoserver;

buf:=wh;

sendtoserver;

buf:=wh;

sendtoserver;

buf:=enchant;

sendtoserver;

end;

            end.

Link to comment
Share on other sites

  • 2 weeks later...
  • 2 weeks later...

den eiani etsi opos to fantazesai...na patas deksi klik panw st croll gia na kani  ++ kai na min spane..ayto aplos einai fast enchant....

gia na to kanei safe enchant thelis scriptaki :P

exw na soy dwso ena aplos theli na alazis kapoia packet snifer gia na poiani to safe enchant

kai na patas to /social vicrory poy tha to vris sto l2mesa an patiseis ALT + C...:P

edo einai to script.....

 

var a:array[1..100] of string;

      i,n:integer;

id,withdraw,openwh,useitem,wh,enchant :string;

begin

//Item id need to be captured.For example from UseItem packet

id:=hstr('7F 50 02 10');

useitem:=hstr('14')+id+hstr('00 00 00 00');

wh:=hstr('31 01 00 00 00')+id+hstr('01 00 00 00');

enchant:=hstr('58')+id;

//openwh need to be captured:RequestBypassToServer

openwh:=hstr('32 01 00 00 00 7F 50 02 10 01 00 00 00');

withdraw:=hstr('32 01 00 00 00')+id+hstr('01 00 00 00');

if (fromclient) and (pck=hstr('1B 02 00 00 00 ')) then

begin

buf:=withdraw;

sendtoserver;

buf:=openwh;

sendtoserver;

end;

if (fromclient) and (pck=hstr('1B 03 00 00 00 ')) then

begin

buf:=useitem;

sendtoserver;

buf:=wh;

sendtoserver;

buf:=wh;

sendtoserver;

buf:=enchant;

sendtoserver;

end;

            end.

tsampa to dineis auto exei fix edw k xronia..pane autes oi epoxes me announce k enchant:/

 

mexri stigmis dn uparxei kati gia safe enchant alla sigoura tha vrethei new..

Link to comment
Share on other sites

  • 2 weeks later...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



  • Posts

    • Hello if anyone is looking for interlude server with free bot, no P2W and uniques features I can recommend freshly opened https://l2romans.com/features/, great server for chilling and having fun with friends casually. Everyone is welcomed
    • So excited to announce 3x Telegram Premium (6 months)   Join our official TG and participate to win!   Asocks.com - trusted proxy service providing mobile and residential proxies with a single price of $3 per 1GB   A huge locations pool and high speed will help complete all tasks    
    • Well, sorry not sorry for resurrecting old topic, but I believe it's ultimately stupid to implement license checks like Vilmis did 🙂   private static String url = "jdbc:mysql://185.80.128.233/" + getData("Zm9ydW1fZGI="); private static String username = getData("bXJjb3B5cmlnaHQ="); private static String password = getData("Y29weXJpZ2h0XzEyMw=="); con = GlobalDB.getInstance().getConnection(); PreparedStatement statement; statement = con.prepareStatement("SELECT field_6 from core_pfields_content WHERE member_id = ?"); statement.setInt(1, Config.FORUM_USER_ID); ResultSet rset = statement.executeQuery();   This awesome way of coding things leaves us with base64-encoded credentials and DB exposed and accessible globally 😉 Btw he checks his licensing data from some plugin generated table his forum uses. Vilmis took action and ensured that mrcopyright user would have only needed accesses and rights for this operation. But he forgot to ensure that his INFORMATION_SCHEMA database would not be exposed and readable... That leads us to fully readable server variables like version used (10.1.26-MariaDB-0+deb9u1 - pretty ancient DB and OS, I'd assume). From here you can go south and do some kinky stuff, if you want and have knowledge for that. But who cares, right?   Ooh, table core_pfields_content field_6 is IP address which is checked by FORUM_USER_ID. Yep, you can query all IP addresses there (124 of them right now) and also do whatever you want with them! 🙂  The most fun part? Files source has been shared what, more than 2 years ago?  Vilmis still uses very same credentials and never changed it after sources exposure - who cares. Although, "sources" may be way too strong word here. If anyone still use paid Orion versions, I'd suggest packing your shit and leaving immediately, or at least fix this incompetent fool caused problems. It's obvious Vilmis don't care or maybe doesn't even know from the first place how to solve this problem (hint hint - tiny PHP Rest API microservice which would do absolutely the same but without exposing sensitive data?). By doing that, he exposes his infrastructure and YOUR data, and he does that for more than 2 years now 🙂 Developer of century!    
  • Topics

×
×
  • Create New...