Jump to content

Recommended Posts

Posted

well i dont know i saw in the video that it sends the packets but its already sent 130 k packets to the server i am trying to make lag/off and nothing not even little lag lol so i dont know what to say but still thx for sharing it ....

Posted

to make this you only need a terminal it's just a tcp/udp flooder , i can make this using the cmd of xp theoritically.

google udp flooder funny lineage protocol is based most on tcp connections.

 

anyways if anyone has a l2Jserver already running , has configured it correctly so i can connect to it and it is for testing purposes , i am offered to find the exploits available to actually gain control over the server and to any server until it gets patched , i'm really furstrated i spent the whole day trying to crack a mysql but the server i want to hack is owned by an IT company and he has secured it well the only thing left is to try a bruteforcer like hydra .. but i think that there are payloads that can be landed on the victim machine. If only an early version of XAMPP was used..

 

THIS COMPLETELY SUCKS BIGTIME IM GONNA CRACK A NOOB BOX NOW !just kidding..

 

Posted

to make this you only need a terminal it's just a tcp/udp flooder , i can make this using the cmd of xp theoritically.

google udp flooder funny lineage protocol is based most on tcp connections.

 

anyways if anyone has a l2Jserver already running , has configured it correctly so i can connect to it and it is for testing purposes , i am offered to find the exploits available to actually gain control over the server and to any server until it gets patched , i'm really furstrated i spent the whole day trying to crack a mysql but the server i want to hack is owned by an IT company and he has secured it well the only thing left is to try a bruteforcer like hydra .. but i think that there are payloads that can be landed on the victim machine. If only an early version of XAMPP was used..

 

THIS COMPLETELY SUCKS BIGTIME IM GONNA CRACK A NOOB BOX NOW !just kidding..

 

 

Im gonna have to agree :( this does not work anymore and is an old method like POD or maybe it is POD.

POD = Ping of Death.

 

PS: Servers now have flood protection for packets from hlapex and phx to network flooding attacks.

Posted

1st way i thought was with "zombie computers" this method always works but requires a lot of planning like distributing the trojan e.t.c.

else is with malformed headers e.t.c. and requires network architecture knowledge..

 

i remember darkmindz.com had a nice flooder that was written in php language , is this one is in vb ?

 

who will let me test his l2server ? i will report to him the vulnerabilities and not actually hack it..

 

last server i tried to exploit was using xampp but was ubersecured

Posted

has anyone tried using wireshark instead of l2phx? i would test it myself but i can't run lineage when im on linux :P

 

bruteforce is sloooooooow!

I have tried wireshark with no luck :/ , anyway wireshark is like general software and its not as specialized as phx is.

PS: The packets you get from wireshark are many and you have to identify the ones for l2.

 

Awesom staff thx for it =]

Have you even tried it???

Guest
This topic is now closed to further replies.



×
×
  • Create New...

AdBlock Extension Detected!

Our website is made possible by displaying online advertisements to our members.

Please disable AdBlock browser extension first, to be able to use our community.

I've Disabled AdBlock