Please stop. I have been watching this conversation since it started.
Provide a case-specific example if you can. If not, please keep your
solutions to yourself.

I may not be an IT graduate, but I have a keen understanding of when
someone is full of themself.

Besides: your server has custom files disabled, why bother talking to a
brick wall anymore just to have a bunch of people you clearly don't respect
do the same?

-OF

On Oct 10, 2017 10:41 AM, "Stealth Mode" <[email protected]> wrote:

> So clueless I hold an electronics engineering degree, an IT industry
> degree, and am currently studying CCIE/CCDE and contracting with Cisco to
> develop electronics safeguards to protect from binary injections into IT
> infrastructure.
>
> Please refrain from trolling, flaming, etc. You do not have an education
> in this field.
>
> -StealthMode
>
> On Tue, Oct 10, 2017 at 10:27 AM, Nomaan Ahmad <[email protected]>
> wrote:
>
>> This guy is clueless.
>>
>> On 10 Oct 2017 3:25 pm, "Stealth Mode" <[email protected]> wrote:
>>
>>> Actually my information is grounded in fact and 100% replicatable if you
>>> know the field. I've listed a few resources to educate yourself. Please
>>> refrain from speaking if you do not have an education in ITSec.
>>>
>>> https://books.google.com/books?id=0OlIT9eEEsoC&pg=PA193&lpg=
>>> PA193&dq=image+file+injection+compromsing+server&source=bl&o
>>> ts=vGZbN7Qhsb&sig=3CbPAaU8hPbmqemmMXQ4kZXoI2E&hl=en&sa=X&ved
>>> =0ahUKEwiG58epn-bWAhVi_IMKHcaqD5YQ6AEIYDAJ#v=onepage&q=
>>> image%20file%20injection%20compromsing%20server&f=false
>>>
>>> The links I've provided are just a few examples. Anyone can make a
>>> custom image file (weapon skin, or spray paint, or wad in a .bsp) inject
>>> code into it, and use your server, and clients connected to it to launch
>>> whatever code they want. In the links provided, these are image files used
>>> to inject code into web servers once the image is loaded. Meaning, once a
>>> spray is sprayed, or a client uses x weapon skin through GO market. Once
>>> sent to server/client cache, it then executes spraying a benign image, or
>>> rendering a benign looking skin, while behind the scenes it is also
>>> executing code. Now most of these script kiddies probably are just using
>>> the images to run hacks, which yes they can be just that benign. However,
>>> more sophisticated hackers can also use this to compromise entire networks,
>>> backbones, etc.
>>>
>>> On Mon, Oct 9, 2017 at 8:28 PM, devu4 <[email protected]> wrote:
>>>
>>>> This is such a pointless thread, no proof and a big headed clueless guy
>>>> coming out with irrelevant crap!
>>>>
>>>>
>>>>
>>>> --
>>>> Sent from: http://csgo-servers.1073505.n5.nabble.com/
>>>>
>>>> _______________________________________________
>>>> Csgo_servers mailing list
>>>> [email protected]
>>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>>>>
>>>
>>>
>>> _______________________________________________
>>> Csgo_servers mailing list
>>> [email protected]
>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>>>
>>
>> _______________________________________________
>> Csgo_servers mailing list
>> [email protected]
>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>>
>
>
> _______________________________________________
> Csgo_servers mailing list
> [email protected]
> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>
_______________________________________________
Csgo_servers mailing list
[email protected]
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers

Reply via email to