that stupid humor wont make ppl forgive you worthless shitQuote:
Originally Posted by BoTGoD
Printable View
that stupid humor wont make ppl forgive you worthless shitQuote:
Originally Posted by BoTGoD
Actually. Anyone with Very good Equivalent knowlege of the hacking system ( known as the hackers black book ) could easily steal their server files to be honest with you. i guess your all wondering how right? simple. you should all have logically guess that a server can be run between 3 or 4 computers or more if chosen. why am i stating all this unessacery BS right? just wait im coming to my point. well. we all know that we can decode C2 l2.ini. there is indeed an address in there or what we like to call an ip adress in there. right? well. if you knew how to go thru what they call historized IP port checks. you can practically trace an ip no matter if its covered by 10 others. once again your all wondering WTF is he talking about? well. its simple. why not mask your ip 10-15 times. and just steal it for your selves. hack their ip adresses and Take their info. because after all. that webpage that so indoubtably makes your accounts connects to the same database that your Server files uses. get ahold of that. enter their computer. and you could rip it out of their system unanmously save it to a CD and take it home. now dont be stupid and steal them from you home computer because you will surely be caught but if your using a computer at a cafe or whatever ect ect. then. well. do i need to say more? want to learn how to do all this "stealing" of server files. remember the black book i was talkin about. it exist. and it has actual content. you can grab it here. http://www.hackersbook.com/info.php?ref=2751&lk=1&nep=1 buy it. read it. and then. go have your selves some fun stealing their official shit. ( no i dont have it so dont ask. ) if i go down by law im taking someone with me. and i have no one i can take with me so. im not gonna try hacking them at this point in time. also to the person who thought the Sina team got caught. nope. they relocated. use copernic agent pro if you want to locate them chinese fools.
Ahahahahahahahaha..... *stops to breathe* Hahaha.Quote:
Originally Posted by sxymxd84
Quote from the page:
"I'm a hacker, I'm going to steal files! By the way, what's TCP?"Quote:
Every day you hear in the daily news about hackers, virus, worms and trojans, SUB7, TCP, IP, PING, spoofing, sniffing, DDOS attacks, ...? And you don't know exactly what it is and how hackers do that. Don't rest a "lamer", Hacker's Blackbook let's you know and discovers many secrets.
Sorry, but you can't learn network penetration from a book.
Wow, a CD-ROM full of 'tools'! Let's see what's on it!Quote:
the CD-ROM helps and provides "clean" files. Tipp: Never download files from sites you don't know. Hiding adware, spyware and trojans in free download files is actually a big problem.
Uh, you mean like the proxy support built into every fucking OS since forever?Quote:
Proxy: Use this programs to access the net through a proxy server, thus remaining anonymous. "Surfing the net Anonymously"
Uh, phreaking is about way more than free calls. A clear indication the author doesn't have a fucking clue what he's talking about.Quote:
Phreaking: You can make calls for free using this. It also contains the widely known BlueBox.
Oh, how useful. Viruses that EVERYONE AND THEIR MOM ALREADY HAVE ANTI-VIRUS DEFINITIONS FOR. Instead of, you know, providing information on how to write them.Quote:
Viruses: 900 of the most dangerous viruses including the famous I_LOVE_YOU virus or the CH virus that overwrites Bios rendering your computer useless. It is not possible to start these viruses by mistake from the CD, because there is a built-in protection.
You mean the tools that generate 800 million 'different' viruses based on the same engine, which will all be detected by modern heuristics? Virus generators went out of fashion in the mid 90's...Quote:
Virus generators: You can use this tool to create your own virus within the wink of an eye. They are all easy to use.
Yeah, cuz I can't do that with a 2-line shell script...Quote:
Mail bomb: Did you ever want to send someone 1000 mails all at once? No problem. Several Email bombers are in the CD. You can bomb any Email address that you wish to.
Yeah, cuz emulation has a lot to do with network penetration.Quote:
Romz emulators: Play all video games regardless of the consoles on your PC. You will be impressed.
What about UDP/IP? ICMP? Sounds like a pretty shitty scanner. Maybe they should include nmap (http://www.insecure.org/nmap/) since it's obviously better. Wonder if they even mention Nessus...Quote:
Scanner: This programs look over all your Ports e.g. TCP/IP. You can therefore effectively protect yourself. We strongly recommend, to use a firewall.
In short, sounds like someone's hawking some Windows-based l33t-|)Ud3 h4x0rz t00lz for a price tag. Seriously... who does network penetration from Windows? They should have called the book "Teach Yourself Script Kiddie in 24 Hours!" or "L33t Sp34k Fer N00bs".
lol @ alter3d
anyway I saw that page years ago..
so if there was anything interesting in that script kiddie book at all
its outdated.
If you wanne learn how to "hack" go to your local library
and BoRRoW a c++ programming book for free (be sure its up2date)
Enough said.
Just patch'em.
C2 uses RSA which means that there are 2 keys - one for decryption & one for encryption. So, "public" (deryption) key is stored somwhere in EXE, which means we can change it :) And, of course, if we can change it, we can re-encrypt all files with new key pair.
BTW, this technology is used by l2encdec.
Sry, forgot to read to the end :(
Close. :) RSA actually works on 3 pieces of information (private exponent, public exponent, and modulus). You make two key-pairs... the first key pair is the public exponent + the modulus; this pair is made public. The second key pair is your private exponent + the modulus; this pair is kept secret (although obviously you've already published the modulus, so only your private exponent is really secret).Quote:
Originally Posted by Livid
However, BOTH the public pair and private pairs can be used for either encryption or decryption -- the direction is completely transparent to the algorithm.
This distinction is important because it provides a very useful mechanism -- digital signatures.
If someone wants to encrypt something so only you can read it, they encrypt it with your public key pair, and ONLY your private exponent/modulus pair can decrypt the data.
However... if you wanted to release some files publicly and prove that they came from you, you encrypt the files with your *private* exponent/modulus, and anyone who has your public exponent/modulus can decrypt it. Assuming that they trust that the public key in question actually belongs to you and that the corresponding private key hasn't been compromised, they can easily verify the source of the files.
The issue of 'trust' in the cryptographic sense is an interesting one, and some quick Googling can get you tons of info on that subject if you're so interested.
The math behind RSA is explained here: http://world.std.com/~franl/crypto/rsa-guts.html Interesting stuff if you're into crypto. :)
ok this is just plain gay. youre acting like those aol script kiddies that get a trojan, infect themselves and then scream OMFG IM A L337 H4X0R PH34R ME!!!!11!oneoneQuote:
Originally Posted by sxymxd84
bye n00b.
That is just....lmfao. gg script kiddiez!Quote:
Originally Posted by sxymxd84
can you get me some new server files please since i'm getting bored like cronous tw version or a3 korean version , you seem to be pretty tuff
btw do l2 c1 have dragons ? or its just c2 ?!
oh ps i know an ip for l2 c3 ( its on tests ) and their security is open ip = 127.0.0.1 ( you can access it by ftp if you want ) login = l2c3open , password = r2d23cpo
I heard c1 has like 5 dragons u can ride and eat people with! and liek I play on the test c3 server but my pet elpy won't eat du u know why!?Quote:
Originally Posted by Akaruz
How to it(him) to be connected?Quote:
ip = 127.0.0.1 ( you can access it by ftp if you want ) login = l2c3open , password = r2d23cpo
Moreover IP the address strange
that was a joke.
If you don't know what 127.0.0.0/8 is, you shouldn't even be thinking of setting up a server...Quote:
Originally Posted by Freak_man
Server WTF is a Server ? Can i eat it ?
Make sure you only buy free-range servers for consumption, servers that have been jail(8)'ed tend to be tough and stringy.Quote:
Originally Posted by Takeo
My brain is itchy. Man I laughed at that script kiddie post :thumbup:
i think its better to dont bitchin and lying here, better all search for the official files and dont talk no more shit :toilet_cl
oh the hilarious topic ever i read. lol,collection of 12 years old script kiddie post. ffs stop posting lame ass book and crappy tool. prove it by real.post real c2 server.not fuckin script kiddie theory.
@alter3d
hehehe,nice one mate . powned one ;)
:)
<no comments>
:)
shut up let it die
I don't know CHINEESE Language but Google translator is enought for me. let see this chineese.
http://translate.google.com/translat...bbs.99nets.com
http://translate.google.com/translat...ww.sinatt2.com
i know this 2 sites i havent found any on it :(
the site for the new book is not that site. for 2 a script kiddie i think not. i can take over you fucking pc you dumb asses. and then kill your HD and you MB assuming you know what that is. and then. ill obtain you CC and BI and use it to make myself terribly rich and make your life a fucking hell. better yet ill erase you from history. If you wanna play. let me know.
Quote:
Originally Posted by foxmulder
lets see here. i very well could. better yet. ill tell you how to do it so can can spend the next 100 DECADES in prison.