Please stop. I have been watching this conversation since it started. Provide a case-specific example if you can. If not, please keep your solutions to yourself.
I may not be an IT graduate, but I have a keen understanding of when someone is full of themself. Besides: your server has custom files disabled, why bother talking to a brick wall anymore just to have a bunch of people you clearly don't respect do the same? -OF On Oct 10, 2017 10:41 AM, "Stealth Mode" <[email protected]> wrote: > So clueless I hold an electronics engineering degree, an IT industry > degree, and am currently studying CCIE/CCDE and contracting with Cisco to > develop electronics safeguards to protect from binary injections into IT > infrastructure. > > Please refrain from trolling, flaming, etc. You do not have an education > in this field. > > -StealthMode > > On Tue, Oct 10, 2017 at 10:27 AM, Nomaan Ahmad <[email protected]> > wrote: > >> This guy is clueless. >> >> On 10 Oct 2017 3:25 pm, "Stealth Mode" <[email protected]> wrote: >> >>> Actually my information is grounded in fact and 100% replicatable if you >>> know the field. I've listed a few resources to educate yourself. Please >>> refrain from speaking if you do not have an education in ITSec. >>> >>> https://books.google.com/books?id=0OlIT9eEEsoC&pg=PA193&lpg= >>> PA193&dq=image+file+injection+compromsing+server&source=bl&o >>> ts=vGZbN7Qhsb&sig=3CbPAaU8hPbmqemmMXQ4kZXoI2E&hl=en&sa=X&ved >>> =0ahUKEwiG58epn-bWAhVi_IMKHcaqD5YQ6AEIYDAJ#v=onepage&q= >>> image%20file%20injection%20compromsing%20server&f=false >>> >>> The links I've provided are just a few examples. Anyone can make a >>> custom image file (weapon skin, or spray paint, or wad in a .bsp) inject >>> code into it, and use your server, and clients connected to it to launch >>> whatever code they want. In the links provided, these are image files used >>> to inject code into web servers once the image is loaded. Meaning, once a >>> spray is sprayed, or a client uses x weapon skin through GO market. Once >>> sent to server/client cache, it then executes spraying a benign image, or >>> rendering a benign looking skin, while behind the scenes it is also >>> executing code. Now most of these script kiddies probably are just using >>> the images to run hacks, which yes they can be just that benign. However, >>> more sophisticated hackers can also use this to compromise entire networks, >>> backbones, etc. >>> >>> On Mon, Oct 9, 2017 at 8:28 PM, devu4 <[email protected]> wrote: >>> >>>> This is such a pointless thread, no proof and a big headed clueless guy >>>> coming out with irrelevant crap! >>>> >>>> >>>> >>>> -- >>>> Sent from: http://csgo-servers.1073505.n5.nabble.com/ >>>> >>>> _______________________________________________ >>>> Csgo_servers mailing list >>>> [email protected] >>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers >>>> >>> >>> >>> _______________________________________________ >>> Csgo_servers mailing list >>> [email protected] >>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers >>> >> >> _______________________________________________ >> Csgo_servers mailing list >> [email protected] >> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers >> > > > _______________________________________________ > Csgo_servers mailing list > [email protected] > https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers >
_______________________________________________ Csgo_servers mailing list [email protected] https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
