A fearmonger? LMAO. Let me tell you what can really be done. Using binary
electronics components programming someone can launch a DDOS attack from
vulnerable servers like this. Happens ALL of the time. Ignore the warnings.
Leave your servers wide open. Disrespect me again, and I'll make sure to
gnore you.

I have more server admin/owner experience than half of you script kiddies
playing around with network security that you have no CLUE about.

So yes, ignore me out of hand. Be that ignorant in your lack of I.T.
Security that you would ignore one of the only ccie/ccde on this list.

Have a nice day, amateur.

On Wed, Apr 18, 2018, 20:59 Dan B (Narry) <[email protected]>
wrote:

> Ignore him. He's a fearmongerer who doesn't know what he's talking about.
> If you're ever in for a laugh, read the archives of this mailing list
> (might have been HLDS?) and look at the absolute giant thread caused by him
> claiming the existence of remote upload exploits while making an absolute
> fool of himself.
>
> On Wed, Apr 18, 2018 at 8:52 PM, Nomaan Ahmad <[email protected]> wrote:
>
>> What do you mean by MAC Address? I don't think that is available to the
>> server.
>>
>> On 19 April 2018 at 01:46, Stealth Mode <[email protected]>
>> wrote:
>>
>>> The top part of that is calling to a memory address location in
>>> hexidecimal where null.wav is stored. Without null.wav on the server it
>>> eats up cycles to search for it in memory.
>>>
>>> Can create a bash script to look for keywords in this script and
>>> automatically ban the MAC ADDRESS. Not the IP address (takes some
>>> translation from decimal to hexidecimal).
>>>
>>> Cough Valve AntiCheat/Alfred hope you see this.
>>>
>>> -Stealthmode
>>>
>>> On Wed, Apr 18, 2018, 20:37 Stealth Mode <[email protected]>
>>> wrote:
>>>
>>>> Thanks God for sandbox virtual machine environments to run servers in.
>>>> That's all I will say.
>>>>
>>>> On Wed, Apr 18, 2018, 20:35 Stealth Mode <[email protected]>
>>>> wrote:
>>>>
>>>>> Think about this carefully. This client is able to inject scripts
>>>>> through the server to all clients. I warned this list months ago about how
>>>>> unsecure these servers really are. That can easily be a different script
>>>>> through a spoofed steamid that randomly changes. Image injections. Packet
>>>>> injections. Script injections. I'd be more worried about what he can use
>>>>> the server to inject into the OS cmd shell/powershell.
>>>>>
>>>>> These servers are really vulnerable from a network security
>>>>> standpoint. Be glad your client isn't malicious. Or your server and all of
>>>>> those clients could be remote hijacked.
>>>>>
>>>>> -Stealthmode
>>>>>
>>>>> On Wed, Apr 18, 2018, 17:42 Nathaniel Theis <[email protected]> wrote:
>>>>>
>>>>>> hook recvmsg and kick if you get more than one signon message on a
>>>>>> given cnetchan (might need to check the server count though, not sure
>>>>>> if you get another signon message from legit clients at map
>>>>>> change...)?
>>>>>>
>>>>>> (normal connection throttling should stop the obvious workaround (just
>>>>>> reconnecting)
>>>>>>
>>>>>> On Tue, Apr 17, 2018 at 1:22 PM, iNilo <[email protected]> wrote:
>>>>>> > A player on my server was able to spam all the clients with a
>>>>>> script he
>>>>>> > later linked ( https://hastebin.com/fufarowuba.cpp )
>>>>>> >
>>>>>> > its causing massive console spams.
>>>>>> >
>>>>>> > https://i.imgur.com/nOWLkeq.png
>>>>>> >
>>>>>> > Someone has a fix for this?
>>>>>> >
>>>>>> > - iNilo.
>>>>>> >
>>>>>> >
>>>>>> > _______________________________________________
>>>>>> > Csgo_servers mailing list
>>>>>> > [email protected]
>>>>>> >
>>>>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>>>>>>
>>>>>> _______________________________________________
>>>>>> Csgo_servers mailing list
>>>>>> [email protected]
>>>>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>>>>>
>>>>>
>>> _______________________________________________
>>> Csgo_servers mailing list
>>> [email protected]
>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>>>
>>
>>
>> _______________________________________________
>> Csgo_servers mailing list
>> [email protected]
>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>>
>
> _______________________________________________
> Csgo_servers mailing list
> [email protected]
> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
_______________________________________________
Csgo_servers mailing list
[email protected]
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers

Reply via email to