Quote:
Originally Posted by akito112
BSQuote:
Originally Posted by dr.stank
-------------
Printable View
Quote:
Originally Posted by akito112
BSQuote:
Originally Posted by dr.stank
-------------
I see interesting way of bullshitting people :)
1. You state topic like "c2 is mine and i'm going to release it" or "c1-c2 fully implemented will be soon"
2. Wait 12-24 hours to see how ppl will laugh, agree, worship, cry... etc. about Your topic.
3. Then declare that ppl too much bullshits on You and refuse to release it.
That comes to my mind that those ppl are stupid and needs medical attention (conclusion: the lack of regard).
If anyone would want to post c2 off (if there's really any) or c1-c2 mix fully working then that person would state topic with attached files/links way to get it.
lmfao! cant belive this thread came back up top. Capn,BotGod,Scrappy all pwnt you. :thumbup:
actually anyone seeing this topic should imediatly think "not again..."
We wont ever see C2 offi or C3 till its way to late... so let it go.. let the fucking post die..
And i believe this post was simply a "CAPN: IM GONNA ADD C2 CONTENT TO C1 AND CALL IT C2 OFFICIAL!!!"
Let it go, Capn is a retard, lets all face it.. no offence tho Capn - aint your fault..
hehe...
lol.. C2 off files..
ok ok..
Why not C3 OFF?:))))
I have chronicle 5 already, No joke.
bullshit you cannot have it because i didn't give you :)
ok you caught me Vaskes :(
:))))
Quote:
Originally Posted by DomZelan
that stupid humor wont make ppl forgive you worthless shitQuote:
Originally Posted by BoTGoD
Actually. Anyone with Very good Equivalent knowlege of the hacking system ( known as the hackers black book ) could easily steal their server files to be honest with you. i guess your all wondering how right? simple. you should all have logically guess that a server can be run between 3 or 4 computers or more if chosen. why am i stating all this unessacery BS right? just wait im coming to my point. well. we all know that we can decode C2 l2.ini. there is indeed an address in there or what we like to call an ip adress in there. right? well. if you knew how to go thru what they call historized IP port checks. you can practically trace an ip no matter if its covered by 10 others. once again your all wondering WTF is he talking about? well. its simple. why not mask your ip 10-15 times. and just steal it for your selves. hack their ip adresses and Take their info. because after all. that webpage that so indoubtably makes your accounts connects to the same database that your Server files uses. get ahold of that. enter their computer. and you could rip it out of their system unanmously save it to a CD and take it home. now dont be stupid and steal them from you home computer because you will surely be caught but if your using a computer at a cafe or whatever ect ect. then. well. do i need to say more? want to learn how to do all this "stealing" of server files. remember the black book i was talkin about. it exist. and it has actual content. you can grab it here. http://www.hackersbook.com/info.php?ref=2751&lk=1&nep=1 buy it. read it. and then. go have your selves some fun stealing their official shit. ( no i dont have it so dont ask. ) if i go down by law im taking someone with me. and i have no one i can take with me so. im not gonna try hacking them at this point in time. also to the person who thought the Sina team got caught. nope. they relocated. use copernic agent pro if you want to locate them chinese fools.
Ahahahahahahahaha..... *stops to breathe* Hahaha.Quote:
Originally Posted by sxymxd84
Quote from the page:
"I'm a hacker, I'm going to steal files! By the way, what's TCP?"Quote:
Every day you hear in the daily news about hackers, virus, worms and trojans, SUB7, TCP, IP, PING, spoofing, sniffing, DDOS attacks, ...? And you don't know exactly what it is and how hackers do that. Don't rest a "lamer", Hacker's Blackbook let's you know and discovers many secrets.
Sorry, but you can't learn network penetration from a book.
Wow, a CD-ROM full of 'tools'! Let's see what's on it!Quote:
the CD-ROM helps and provides "clean" files. Tipp: Never download files from sites you don't know. Hiding adware, spyware and trojans in free download files is actually a big problem.
Uh, you mean like the proxy support built into every fucking OS since forever?Quote:
Proxy: Use this programs to access the net through a proxy server, thus remaining anonymous. "Surfing the net Anonymously"
Uh, phreaking is about way more than free calls. A clear indication the author doesn't have a fucking clue what he's talking about.Quote:
Phreaking: You can make calls for free using this. It also contains the widely known BlueBox.
Oh, how useful. Viruses that EVERYONE AND THEIR MOM ALREADY HAVE ANTI-VIRUS DEFINITIONS FOR. Instead of, you know, providing information on how to write them.Quote:
Viruses: 900 of the most dangerous viruses including the famous I_LOVE_YOU virus or the CH virus that overwrites Bios rendering your computer useless. It is not possible to start these viruses by mistake from the CD, because there is a built-in protection.
You mean the tools that generate 800 million 'different' viruses based on the same engine, which will all be detected by modern heuristics? Virus generators went out of fashion in the mid 90's...Quote:
Virus generators: You can use this tool to create your own virus within the wink of an eye. They are all easy to use.
Yeah, cuz I can't do that with a 2-line shell script...Quote:
Mail bomb: Did you ever want to send someone 1000 mails all at once? No problem. Several Email bombers are in the CD. You can bomb any Email address that you wish to.
Yeah, cuz emulation has a lot to do with network penetration.Quote:
Romz emulators: Play all video games regardless of the consoles on your PC. You will be impressed.
What about UDP/IP? ICMP? Sounds like a pretty shitty scanner. Maybe they should include nmap (http://www.insecure.org/nmap/) since it's obviously better. Wonder if they even mention Nessus...Quote:
Scanner: This programs look over all your Ports e.g. TCP/IP. You can therefore effectively protect yourself. We strongly recommend, to use a firewall.
In short, sounds like someone's hawking some Windows-based l33t-|)Ud3 h4x0rz t00lz for a price tag. Seriously... who does network penetration from Windows? They should have called the book "Teach Yourself Script Kiddie in 24 Hours!" or "L33t Sp34k Fer N00bs".
lol @ alter3d
anyway I saw that page years ago..
so if there was anything interesting in that script kiddie book at all
its outdated.
If you wanne learn how to "hack" go to your local library
and BoRRoW a c++ programming book for free (be sure its up2date)
Enough said.
Just patch'em.
C2 uses RSA which means that there are 2 keys - one for decryption & one for encryption. So, "public" (deryption) key is stored somwhere in EXE, which means we can change it :) And, of course, if we can change it, we can re-encrypt all files with new key pair.
BTW, this technology is used by l2encdec.
Sry, forgot to read to the end :(