Re: [Csgo_servers] Update

2018-05-08 Thread Ryan Bentley
 "I am back tracing the Mac address of the proton VPN user now. I am
awaiting protons I.T. department to go through their server logs for the
Swiss proxy server they went through."

Stealth is a 10/10 troll, I'm convinced. Bravo.

On Tue, May 8, 2018 at 8:45 PM, Stealth Mode 
wrote:

> The bad part is the bot mails aren't on one device. I have been contacted
> outside of this list from someone using proton VPN/protonmail
> harassing/stalking me with outdated personal information.
>
> I suspect this is the same person who has these scripts running to spam
> the list with random mail domain porn bots.
>
> I am back tracing the Mac address of the proton VPN user now. I am
> awaiting protons I.T. department to go through their server logs for the
> Swiss proxy server they went through.
>
> -Stealthmode
>
> On Tue, May 8, 2018, 08:44 ics  wrote:
>
>> These bots seem to spoof existing users and cause issues for them. For
>> example, i got 2 mails from the list that i've been unsubscribed due to
>> excessive bounces few weeks ago and i havent even posted to this list
>> more than once in the last 4-5 months.
>>
>> Your membership in the mailing list Csgo_servers has been disabled due
>> to excessive bounces The last bounce received from you was dated
>> 22-Apr-2018.
>>
>> Propably going to receive yet another porn mail after this mail where
>> some bot showcases image of some naked girl and pretends to be her.
>>
>> -ics
>>
>> ProJaCore wrote:
>> > Porn bots are just a huge risk.
>> >
>> > they could reaolve your mac address and use the exploit to vacnet ban
>> > you instantly permanent from valve servers.
>> >
>> > you should use a swarm cluster to protect yourself from incoming
>> attacks;
>> > all you need is just stackoverflows.
>> >
>> > Nomaan Ahmad >
>> > schrieb am Di., 8. Mai 2018, 09:59:
>> >
>> > Porn bots are a huge exploit. Just imagine if they uploaded a
>> > picture and executed MD5 hashes on your PC through your browser or
>> > email client. You're all doomed.
>> >
>> > Trust me, I have done PhD in hacking. I have branched off rocket
>> > science into computer hacking.
>> >
>> > On Tue, 8 May 2018, 7:43 am Maxence Sartiaux, > > > wrote:
>> >
>> > Ban the porn bot by mac address
>> >
>> >
>> > On 05/08/2018 07:55 AM, Stealth Mode wrote:
>> >> BTW. Vitaliy. There is a lot of spam incoming from a porn bot
>> >> to this list. From multiple domains. There is also someone
>> >> using proton VPN and protonmail to stalk, and harass people
>> >> on this list. Please forward this info to security.
>> >>
>> >> Thanks in advance.
>> >>
>> >> -Stealthmode
>> >>
>> >> On Mon, May 7, 2018, 16:43 Vitaliy Genkin
>> >> > >> > wrote:
>> >>
>> >> An optional stability update for CS:GO game servers to
>> >> address several network exploits has been released with
>> >> PatchVersion=1.36.3.4 and ServerVersion=667.
>> >>
>> >>
>> >> ___
>> >> Csgo_servers mailing list
>> >> Csgo_servers@list.valvesoftware.com
>> >> 
>> >> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/
>> csgo_servers
>> >>
>> >>
>> >>
>> >> ___
>> >> Csgo_servers mailing list
>> >> Csgo_servers@list.valvesoftware.com
>> >> 
>> >> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/
>> csgo_servers
>> >
>> > ___
>> > Csgo_servers mailing list
>> > Csgo_servers@list.valvesoftware.com
>> > 
>> > https://list.valvesoftware.com/cgi-bin/mailman/listinfo/
>> csgo_servers
>> >
>> > ___
>> > Csgo_servers mailing list
>> > Csgo_servers@list.valvesoftware.com
>> > 
>> > https://list.valvesoftware.com/cgi-bin/mailman/listinfo/
>> csgo_servers
>> >
>> >
>> >
>> > ___
>> > Csgo_servers mailing list
>> > Csgo_servers@list.valvesoftware.com
>> > https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>>
>>
>> ___
>> Csgo_servers mailing list
>> Csgo_servers@list.valvesoftware.com
>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>
>
> ___
> Csgo_servers mailing list
> Csgo_servers@list.valvesoftware.com
> 

Re: [Csgo_servers] Update

2018-05-07 Thread Ryan Bentley
/r/iamverysmart

On Mon, May 7, 2018 at 11:52 PM, David  wrote:

> Yeah if anyone wants to reply to him further please do it directly.
>
> On 7 May 2018 at 23:49, Dan B (Narry) 
> wrote:
>
>> Are we doing this again?
>>
>> On Mon, May 7, 2018 at 6:41 PM, Stealth Mode 
>> wrote:
>>
>>> I was mapping before you knew what cs even was. Lmao. Ever hear of
>>> worldcraft 3.3?
>>>
>>> On Mon, May 7, 2018, 18:28 David  wrote:
>>>
 oh look, another topic stealthmode is clueless on

 On 7 May 2018 at 23:04, ProJaCore  wrote:

> And there we go
>
> again? :)
>
> Stealth Mode  schrieb am Di., 8. Mai 2018,
> 01:03:
>
>> One additional feedback. Any chance tour environment mapping people
>> can go through there maps? And fix the tears, collisions, and other high
>> polygon/calculation areas? Meaning, fix the bugs in their mapping to help
>> reduce gfx lag/stuttering on some clients?
>>
>> If they need help shoot the uncompiled maps to this email address. It
>> really isn't hard to line up faces, and vertices properly.
>>
>> -Stealthmode
>>
>> On Mon, May 7, 2018, 17:57 Stealth Mode 
>> wrote:
>>
>>> +1
>>>
>>> Great job getting this update coded, and patched quickly to address
>>> the issues.
>>>
>>> On Mon, May 7, 2018, 16:43 Vitaliy Genkin 
>>> wrote:
>>>
 An optional stability update for CS:GO game servers to address
 several network exploits has been released with PatchVersion=1.36.3.4 
 and
 ServerVersion=667.


 ___
 Csgo_servers mailing list
 Csgo_servers@list.valvesoftware.com
 https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo
 _servers
>>>
>>> ___
>> Csgo_servers mailing list
>> Csgo_servers@list.valvesoftware.com
>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>
>
> ___
> Csgo_servers mailing list
> Csgo_servers@list.valvesoftware.com
> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>

 ___
 Csgo_servers mailing list
 Csgo_servers@list.valvesoftware.com
 https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>>>
>>>
>>> ___
>>> Csgo_servers mailing list
>>> Csgo_servers@list.valvesoftware.com
>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>>>
>>
>>
>> ___
>> Csgo_servers mailing list
>> Csgo_servers@list.valvesoftware.com
>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>>
>
>
> ___
> Csgo_servers mailing list
> Csgo_servers@list.valvesoftware.com
> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>
___
Csgo_servers mailing list
Csgo_servers@list.valvesoftware.com
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers

Re: [Csgo_servers] Exploit that spams/lags clients

2018-04-25 Thread Ryan Bentley
Stealth,

I'm currently doing an undergraduate in CS. I've pasted your nonsense into
one of our forums as a copypasta for sweet forum karma. Thank you for
making us all laugh! It's funny that you keep mentioning education. If you
sat an online course that covers some basic CS material, you'd be able to
see how ridiculous the things you type are. You have a serious delusional
problem. I suggest you seek help... I can't imagine how unbearable you must
be IRL.

If you ever do become self-aware, you should ask your best friend "Alfred"
to delete these messages as it's pretty embarrassing and if you google
"Stealthmode1975" it comes up with some other awkward things.

Hope you get help soon.

On Wed, Apr 25, 2018 at 7:14 AM, Stefan Reusch  wrote:

> After reading all these messages i came up with an idea. I've reversed the
> very well explained IP to mac and backward converter to create whole new
> technology. I name it mail filter. Possible some of you have already
> reading something about it. It makes it possible to convert unwanted to
> spam to a clean and readable email experience. Possible with some extra
> work we could extend the magical converter to an IP  -> mac -> personal
> identity -> dns profile converter.
>
> PS: Plesse valve do something against trolls like stealthmode
>
> ___
> Csgo_servers mailing list
> Csgo_servers@list.valvesoftware.com
> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>
___
Csgo_servers mailing list
Csgo_servers@list.valvesoftware.com
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers

Re: [Csgo_servers] Exploit that spams/lags clients

2018-04-24 Thread Ryan Bentley
Literally everything you type is completely incorrect. You completely
misunderstand the fundamental basics. I nearly choked laughing on my tea
when you thought you could translate a MAC address to an IP address. How do
you screw up so badly? Get some therapy or something man, you are lying to
yourself every day.

On Tue, Apr 24, 2018 at 9:25 AM, Stealth Mode <stealthmode1...@gmail.com>
wrote:

> Ok kids. Have fun trying to denounce without having the education, or
> knowledge of electronics engineering + I.T. to even have a valid base to
> speak from. I shared what I was here to share. Call it nonsense if you
> wish. Professionals know it is not.
>
> Good day.
>
> On Mon, Apr 23, 2018, 04:39 Ryan Bentley <rdp...@gmail.com> wrote:
>
>> Stealth, you are either a 10/10 troll or a seriously deluded person. You
>> have less knowledge than a 1st year CS student.
>>
>> On Mon, Apr 23, 2018 at 6:47 AM, Stealth Mode <stealthmode1...@gmail.com>
>> wrote:
>>
>>> Your Mac address is converted at the handoff between the hardware layer,
>>> and the transport/packet layer. It then converts to an IP address. Google
>>> converters for deci to hexidecimal. There are plenty out there. Run a plt
>>> sniffer or rcon or netstat table of connections for the IP connected to
>>> your machine.
>>>
>>> On Sun, Apr 22, 2018, 01:39 Zaretti Steve <kosso...@gmail.com> wrote:
>>>
>>>> you are right. You can only see the mac of the nearest switch/router.
>>>> Stealth Mode is just spamming some random word.
>>>>
>>>> 2018-04-22 6:42 GMT+02:00 Mukunda Johnson <muku...@mukunda.com>:
>>>> > I'm pretty sure mac addresses aren't even exposed to the server; this
>>>> topic
>>>> > is getting pretty derailed isn't it?
>>>> >
>>>> > On Sat, Apr 21, 2018 at 8:48 PM, Nomaan Ahmad <n0man@gmail.com>
>>>> wrote:
>>>> >>
>>>> >> Where can I find this IP/decimal to Mac converter you speak of?
>>>> Could you
>>>> >> give an example? You speak highly of yourself, here is your chance
>>>> to prove
>>>> >> it.
>>>> >>
>>>> >> On Sun, 22 Apr 2018, 4:07 am Stealth Mode, <
>>>> stealthmode1...@gmail.com>
>>>> >> wrote:
>>>> >>>
>>>> >>> The fix is to create a bash script that looks for that in the
>>>> server log
>>>> >>> (the repietitive call to null.wav), and automatically ban. If you
>>>> push the
>>>> >>> IP through a ip/decimal conversion tool you can make it a Mac
>>>> address ban
>>>> >>> right in the hardware packet/transport layer.
>>>> >>>
>>>> >>> End of message.
>>>> >>>
>>>> >>> On Thu, Apr 19, 2018, 20:04 wickedplayer494 <
>>>> wickedplayer...@gmail.com>
>>>> >>> wrote:
>>>> >>>>
>>>> >>>> Just to keep everyone on the list in the loop, McJohn said that a
>>>> fix
>>>> >>>> for servers crashing (which I can only assume is a result of this)
>>>> is being
>>>> >>>> worked on:
>>>> >>>> https://www.reddit.com/r/GlobalOffensive/comments/
>>>> 8d7hkr/3kliksphilips_interview_with_a_cheater/dxljl53/?context=3
>>>> >>>>
>>>> >>>> On 4/17/2018 3:22 PM, iNilo wrote:
>>>> >>>>
>>>> >>>> A player on my server was able to spam all the clients with a
>>>> script he
>>>> >>>> later linked ( https://hastebin.com/fufarowuba.cpp )
>>>> >>>>
>>>> >>>> its causing massive console spams.
>>>> >>>>
>>>> >>>> https://i.imgur.com/nOWLkeq.png
>>>> >>>>
>>>> >>>> Someone has a fix for this?
>>>> >>>>
>>>> >>>> - iNilo.
>>>> >>>>
>>>> >>>>
>>>> >>>>
>>>> >>>> ___
>>>> >>>> Csgo_servers mailing list
>>>> >>>> Csgo_servers@list.valvesoftware.com
>>>> >>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/
>>>> csgo_servers
>>>> &

Re: [Csgo_servers] Exploit that spams/lags clients

2018-04-23 Thread Ryan Bentley
Stealth, you are either a 10/10 troll or a seriously deluded person. You
have less knowledge than a 1st year CS student.

On Mon, Apr 23, 2018 at 6:47 AM, Stealth Mode 
wrote:

> Your Mac address is converted at the handoff between the hardware layer,
> and the transport/packet layer. It then converts to an IP address. Google
> converters for deci to hexidecimal. There are plenty out there. Run a plt
> sniffer or rcon or netstat table of connections for the IP connected to
> your machine.
>
> On Sun, Apr 22, 2018, 01:39 Zaretti Steve  wrote:
>
>> you are right. You can only see the mac of the nearest switch/router.
>> Stealth Mode is just spamming some random word.
>>
>> 2018-04-22 6:42 GMT+02:00 Mukunda Johnson :
>> > I'm pretty sure mac addresses aren't even exposed to the server; this
>> topic
>> > is getting pretty derailed isn't it?
>> >
>> > On Sat, Apr 21, 2018 at 8:48 PM, Nomaan Ahmad 
>> wrote:
>> >>
>> >> Where can I find this IP/decimal to Mac converter you speak of? Could
>> you
>> >> give an example? You speak highly of yourself, here is your chance to
>> prove
>> >> it.
>> >>
>> >> On Sun, 22 Apr 2018, 4:07 am Stealth Mode, 
>> >> wrote:
>> >>>
>> >>> The fix is to create a bash script that looks for that in the server
>> log
>> >>> (the repietitive call to null.wav), and automatically ban. If you
>> push the
>> >>> IP through a ip/decimal conversion tool you can make it a Mac address
>> ban
>> >>> right in the hardware packet/transport layer.
>> >>>
>> >>> End of message.
>> >>>
>> >>> On Thu, Apr 19, 2018, 20:04 wickedplayer494 <
>> wickedplayer...@gmail.com>
>> >>> wrote:
>> 
>>  Just to keep everyone on the list in the loop, McJohn said that a fix
>>  for servers crashing (which I can only assume is a result of this)
>> is being
>>  worked on:
>>  https://www.reddit.com/r/GlobalOffensive/comments/
>> 8d7hkr/3kliksphilips_interview_with_a_cheater/dxljl53/?context=3
>> 
>>  On 4/17/2018 3:22 PM, iNilo wrote:
>> 
>>  A player on my server was able to spam all the clients with a script
>> he
>>  later linked ( https://hastebin.com/fufarowuba.cpp )
>> 
>>  its causing massive console spams.
>> 
>>  https://i.imgur.com/nOWLkeq.png
>> 
>>  Someone has a fix for this?
>> 
>>  - iNilo.
>> 
>> 
>> 
>>  ___
>>  Csgo_servers mailing list
>>  Csgo_servers@list.valvesoftware.com
>>  https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>> 
>>  ___
>>  Csgo_servers mailing list
>>  Csgo_servers@list.valvesoftware.com
>>  https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>> >>>
>> >>> ___
>> >>> Csgo_servers mailing list
>> >>> Csgo_servers@list.valvesoftware.com
>> >>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>> >>
>> >>
>> >> ___
>> >> Csgo_servers mailing list
>> >> Csgo_servers@list.valvesoftware.com
>> >> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>> >
>> >
>> >
>> > ___
>> > Csgo_servers mailing list
>> > Csgo_servers@list.valvesoftware.com
>> > https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>>
>> ___
>> Csgo_servers mailing list
>> Csgo_servers@list.valvesoftware.com
>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>
>
> ___
> Csgo_servers mailing list
> Csgo_servers@list.valvesoftware.com
> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>
___
Csgo_servers mailing list
Csgo_servers@list.valvesoftware.com
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers

Re: [Csgo_servers] Recent harassment on Cs go server mail list

2017-10-12 Thread Ryan Bentley
I'll be right back. I'm working on hacking into his JTag layer. I'll get a
proof-of-communication going soon

On Thu, Oct 12, 2017 at 7:35 PM, Ryan Bentley <rdp...@gmail.com> wrote:

> "Even One Warrior Nation Ryan surprised me with his attacks (funny because
> he got into computer science in Baltimore because of conversations we used
> to have on owns 1.0-1.6 servers). Some of these members need suspended, or
> banned outright for harassing persons on this list."
>
> I'm from the UK and have never met you before. Are you insane?
>
> On Thu, Oct 12, 2017 at 5:57 PM, Don Park <st...@tbctactics.com> wrote:
>
>> The thing that probably rubbed people the wrong way was that his first
>> response to asking for clarification and proof that this even is a problem
>> (the guy literally writes, "Don't take this the wrong way"), was a
>> condescending and aggressive tone of:
>>
>> " Yes, IT skills. Electronics skills. And old school knowledge of how to
>> inject image files with malicious code (NetSec/ITSec). This is an older
>> style of "hacking". Remember those warnings about clicking download
>> attachments from the 90s onward? Same thing still applies. Except, there is
>> no detection for any hlds/go server, so an injected image can contaminate a
>> server cache. Which in turn will infect clients. Any image file, any data
>> file really, can be modified like this. Willing to bet good money those
>> $500. go weapon skins have hack code scripted and injected into the image."
>>
>> Or another goodie:
>>
>> "No disrespect intended but you have no idea what you are speaking
>> about." <- kinda hard to not take offense to that for some people.
>>
>> Since then, every single response has been an escalation and reflection
>> of that aggressiveness.  Also the fact that he tries to show he knows his
>> "thing" by giving himself "Professional" "Independent" labels, as if those
>> justify/strengthen his stance.
>>
>> I'm familiar with what he's saying, but the reason why I didn't take him
>> seriously is because he's thinking at a too theoretical of a level.  If you
>> think of a problem at a high-enough level, it makes sense.  But, like any
>> major/professional project people work on, the devil is always in the
>> details.  I'm more keen to trust the developers and engineers at Valve to
>> have figured out that detail than an email about an exploit that makes
>> sense at a theoretical level but has provided no proof or reason that this
>> actually can be exploited.
>>
>> Basically asking for some preliminary results since it seemed
>> under-prepared.
>>
>> - Don
>>
>>
>> On Thu, Oct 12, 2017 at 12:35 PM, Nathaniel Theis <ntth...@gmail.com>
>> wrote:
>>
>>> honestly this is the funniest this list has been in years and I approve
>>>
>>> although I do want to see some sweet looking stock photos of hackers in
>>> trenchcoats or ski masks
>>>
>>> On Oct 12, 2017 9:31 AM, "Michael Loveless" <mloveless1...@gmail.com>
>>> wrote:
>>>
>>>> Seriously man, please stop with the spam. You provided the information
>>>> you felt was necessary and while Valve rarely responds here, they see the
>>>> things reported here. If they feel it holds any credibility, they will look
>>>> into it. Sourcemod devs frequent this as well, and always do anything they
>>>> can to provide security for their users. Your original thread served it's
>>>> purpose, time to move on.
>>>>
>>>> On Thu, Oct 12, 2017 at 12:21 PM, Hasser Css <hasserva...@gmail.com>
>>>> wrote:
>>>>
>>>>> You had your fun already, now stop wasting everyone's time, Mister
>>>>> PoC-in-security-means-Point-Of-Contact, amongst other funny things. :)
>>>>>
>>>>> On Thu, Oct 12, 2017 at 5:48 PM, Stealth Mode <
>>>>> stealthmode1...@gmail.com> wrote:
>>>>>
>>>>>> Alfred, please have whoever is moderating these lists monitor the
>>>>>> list better.
>>>>>>
>>>>>> A recent topic posted about the custom file exploit vulnerability has
>>>>>> demonstrated a problem with list management/administration/mode
>>>>>> ration.
>>>>>>
>>>>>> A number of persons on this list do not have a lot of education in
>&

Re: [Csgo_servers] Recent harassment on Cs go server mail list

2017-10-12 Thread Ryan Bentley
"Even One Warrior Nation Ryan surprised me with his attacks (funny because
he got into computer science in Baltimore because of conversations we used
to have on owns 1.0-1.6 servers). Some of these members need suspended, or
banned outright for harassing persons on this list."

I'm from the UK and have never met you before. Are you insane?

On Thu, Oct 12, 2017 at 5:57 PM, Don Park  wrote:

> The thing that probably rubbed people the wrong way was that his first
> response to asking for clarification and proof that this even is a problem
> (the guy literally writes, "Don't take this the wrong way"), was a
> condescending and aggressive tone of:
>
> " Yes, IT skills. Electronics skills. And old school knowledge of how to
> inject image files with malicious code (NetSec/ITSec). This is an older
> style of "hacking". Remember those warnings about clicking download
> attachments from the 90s onward? Same thing still applies. Except, there is
> no detection for any hlds/go server, so an injected image can contaminate a
> server cache. Which in turn will infect clients. Any image file, any data
> file really, can be modified like this. Willing to bet good money those
> $500. go weapon skins have hack code scripted and injected into the image."
>
> Or another goodie:
>
> "No disrespect intended but you have no idea what you are speaking
> about." <- kinda hard to not take offense to that for some people.
>
> Since then, every single response has been an escalation and reflection of
> that aggressiveness.  Also the fact that he tries to show he knows his
> "thing" by giving himself "Professional" "Independent" labels, as if those
> justify/strengthen his stance.
>
> I'm familiar with what he's saying, but the reason why I didn't take him
> seriously is because he's thinking at a too theoretical of a level.  If you
> think of a problem at a high-enough level, it makes sense.  But, like any
> major/professional project people work on, the devil is always in the
> details.  I'm more keen to trust the developers and engineers at Valve to
> have figured out that detail than an email about an exploit that makes
> sense at a theoretical level but has provided no proof or reason that this
> actually can be exploited.
>
> Basically asking for some preliminary results since it seemed
> under-prepared.
>
> - Don
>
>
> On Thu, Oct 12, 2017 at 12:35 PM, Nathaniel Theis 
> wrote:
>
>> honestly this is the funniest this list has been in years and I approve
>>
>> although I do want to see some sweet looking stock photos of hackers in
>> trenchcoats or ski masks
>>
>> On Oct 12, 2017 9:31 AM, "Michael Loveless" 
>> wrote:
>>
>>> Seriously man, please stop with the spam. You provided the information
>>> you felt was necessary and while Valve rarely responds here, they see the
>>> things reported here. If they feel it holds any credibility, they will look
>>> into it. Sourcemod devs frequent this as well, and always do anything they
>>> can to provide security for their users. Your original thread served it's
>>> purpose, time to move on.
>>>
>>> On Thu, Oct 12, 2017 at 12:21 PM, Hasser Css 
>>> wrote:
>>>
 You had your fun already, now stop wasting everyone's time, Mister
 PoC-in-security-means-Point-Of-Contact, amongst other funny things. :)

 On Thu, Oct 12, 2017 at 5:48 PM, Stealth Mode <
 stealthmode1...@gmail.com> wrote:

> Alfred, please have whoever is moderating these lists monitor the list
> better.
>
> A recent topic posted about the custom file exploit vulnerability has
> demonstrated a problem with list management/administration/moderation.
>
> A number of persons on this list do not have a lot of education in
> cybersecurity. In their ignorance they attack/harass some of the more
> experienced IT professionals on this list.
>
> Some of them I recognize from hlds, and Cs 1.0-1.6 days.
>
> Thanks in advance. Watch this thread on the go list, I bet they even
> harass on this topic. Even One Warrior Nation Ryan surprised me with his
> attacks (funny because he got into computer science in Baltimore because 
> of
> conversations we used to have on owns 1.0-1.6 servers). Some of these
> members need suspended, or banned outright for harassing persons on this
> list.
>
> Sincerely,
> Christopher "StealthMode" Stephen Larkins
> HL Mod server professional since 1999
> Professional CS competitor, and beta tester since 1998
> Independent IT Field Engineer
>
> ___
> Csgo_servers mailing list
> Csgo_servers@list.valvesoftware.com
> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>


 ___
 Csgo_servers mailing list
 Csgo_servers@list.valvesoftware.com
 

Re: [Csgo_servers] Custom files exploit

2017-10-10 Thread Ryan Bentley
Cringe. Please get self-aware and realize how transparent you are. Any 21
year old CS grad can see how stupid this thread is.

On Wed, Oct 11, 2017 at 2:29 AM, Stealth Mode <stealthmode1...@gmail.com>
wrote:

> Available for contract for PenTesting/SecurityAudits, Datacenter
> Migrations, and other IT infrastructure purposes. At the websites listed in
> an earlier mailing.
>
> /tips grey hat (only don the blackhat for government contracts) and exits
>
>
> No further communications. End of conversation.
>
> -StealthMode
>
> On Oct 10, 2017 14:00, "Ryan Bentley" <rdp...@gmail.com> wrote:
>
> ITSec. PoC.
>
> Sincerely,
> Ryan "ExpertMode" Bentley
> Independent IT Field Engineer
>
>
> On Tue, Oct 10, 2017 at 6:50 PM, Nathaniel Theis <ntth...@gmail.com>
> wrote:
>
>> hello I have injected a JavaScript into this email you are all now hacked
>>
>> what do you mean it won't run without an actual vulnerability
>>
>> you're super mega hacked
>>
>> 
>>
>> On Oct 10, 2017 10:02 AM, "iNilo" <inilo.in...@gmail.com> wrote:
>>
>>> I frankly don't care what / where / how you work, or what you have
>>> studied.
>>>
>>> The only thing I know is that this is clearly the wrong channel to do
>>> argue/disclose/chat about.
>>>
>>> http://www.valvesoftware.com/security/
>>>
>>> Hopefully you get thanked in a patch note, if not I'm sure the entire
>>> community will be grateful that you disclosed a major security issue to the
>>> people that *actually *get paid to take care of this.
>>>
>>> Thanks.
>>>
>>>
>>>
>>> 2017-10-10 18:54 GMT+02:00 Saint K. <sai...@specialattack.net>:
>>>
>>>> Christopher,
>>>>
>>>>
>>>>
>>>> I work in “the field” as you like to call it. It’s customary to explain
>>>> the exploit in detail and provide proof the concept (hence the request for
>>>> a PoC) in any form or way.
>>>>
>>>>
>>>>
>>>> Please demonstrate the issue, it be by posting the offending code, you
>>>> recording a video showing a working exploit, or anything along these lines.
>>>>
>>>>
>>>>
>>>> You should know this, if you work in “the field”.
>>>>
>>>>
>>>>
>>>> Regards,
>>>>
>>>>
>>>>
>>>> Saint K.
>>>>
>>>>
>>>>
>>>> *From:* Csgo_servers [mailto:csgo_servers-bounces@l
>>>> ist.valvesoftware.com] *On Behalf Of *Stealth Mode
>>>> *Sent:* 10 October 2017 18:34
>>>> *To:* csgo_servers@list.valvesoftware.com
>>>> *Subject:* Re: [Csgo_servers] Custom files exploit
>>>>
>>>>
>>>>
>>>> @Ryan, etc.
>>>>
>>>>
>>>>
>>>> I studied radio electronics before IT was a thing. NetSec and ITSec go
>>>> hand in hand. My credentials aren't CS, because CS was radio electronics.
>>>> The industry hasn't changed, just a little more vulnerable. Not like I am
>>>> specifically stating how to inject code, or what code to inject on a public
>>>> mailing list. Don't need to. Professionals here know what I am referring
>>>> to. I guess the rest do not have the knowledge to understand what the
>>>> exploit can actually do. You are aware. That is all that matters. Don't
>>>> secure your servers, that is on you. When they get exploited, that is on
>>>> you.
>>>>
>>>>
>>>>
>>>> Have a nice day! End of discussion. No further communications.
>>>>
>>>>
>>>>
>>>> Sincerely,
>>>>
>>>> Christopher "StealthMode" Stephen Larkins
>>>>
>>>> Independent IT Field Engineer
>>>>
>>>> fieldnation.com
>>>>
>>>> workmarket.com
>>>>
>>>> onforce.com
>>>>
>>>> clearancejobs.com
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> On Tue, Oct 10, 2017 at 12:09 PM, Ryan Bentley <rdp...@gmail.com>
>>>> wrote:
>>>>
>>>> My sides at this thread. At first I just rolled my eyes but now I
>>>> actually believe that Stealth Mode is either a troll or delusional. Please
>>>> stop saying "ITSec". Any first year CS studen

Re: [Csgo_servers] Custom files exploit

2017-10-10 Thread Ryan Bentley
ITSec. PoC.

Sincerely,
Ryan "ExpertMode" Bentley
Independent IT Field Engineer


On Tue, Oct 10, 2017 at 6:50 PM, Nathaniel Theis <ntth...@gmail.com> wrote:

> hello I have injected a JavaScript into this email you are all now hacked
>
> what do you mean it won't run without an actual vulnerability
>
> you're super mega hacked
>
> 
>
> On Oct 10, 2017 10:02 AM, "iNilo" <inilo.in...@gmail.com> wrote:
>
>> I frankly don't care what / where / how you work, or what you have
>> studied.
>>
>> The only thing I know is that this is clearly the wrong channel to do
>> argue/disclose/chat about.
>>
>> http://www.valvesoftware.com/security/
>>
>> Hopefully you get thanked in a patch note, if not I'm sure the entire
>> community will be grateful that you disclosed a major security issue to the
>> people that *actually *get paid to take care of this.
>>
>> Thanks.
>>
>>
>>
>> 2017-10-10 18:54 GMT+02:00 Saint K. <sai...@specialattack.net>:
>>
>>> Christopher,
>>>
>>>
>>>
>>> I work in “the field” as you like to call it. It’s customary to explain
>>> the exploit in detail and provide proof the concept (hence the request for
>>> a PoC) in any form or way.
>>>
>>>
>>>
>>> Please demonstrate the issue, it be by posting the offending code, you
>>> recording a video showing a working exploit, or anything along these lines.
>>>
>>>
>>>
>>> You should know this, if you work in “the field”.
>>>
>>>
>>>
>>> Regards,
>>>
>>>
>>>
>>> Saint K.
>>>
>>>
>>>
>>> *From:* Csgo_servers [mailto:csgo_servers-boun...@list.valvesoftware.com]
>>> *On Behalf Of *Stealth Mode
>>> *Sent:* 10 October 2017 18:34
>>> *To:* csgo_servers@list.valvesoftware.com
>>> *Subject:* Re: [Csgo_servers] Custom files exploit
>>>
>>>
>>>
>>> @Ryan, etc.
>>>
>>>
>>>
>>> I studied radio electronics before IT was a thing. NetSec and ITSec go
>>> hand in hand. My credentials aren't CS, because CS was radio electronics.
>>> The industry hasn't changed, just a little more vulnerable. Not like I am
>>> specifically stating how to inject code, or what code to inject on a public
>>> mailing list. Don't need to. Professionals here know what I am referring
>>> to. I guess the rest do not have the knowledge to understand what the
>>> exploit can actually do. You are aware. That is all that matters. Don't
>>> secure your servers, that is on you. When they get exploited, that is on
>>> you.
>>>
>>>
>>>
>>> Have a nice day! End of discussion. No further communications.
>>>
>>>
>>>
>>> Sincerely,
>>>
>>> Christopher "StealthMode" Stephen Larkins
>>>
>>> Independent IT Field Engineer
>>>
>>> fieldnation.com
>>>
>>> workmarket.com
>>>
>>> onforce.com
>>>
>>> clearancejobs.com
>>>
>>>
>>>
>>>
>>>
>>> On Tue, Oct 10, 2017 at 12:09 PM, Ryan Bentley <rdp...@gmail.com> wrote:
>>>
>>> My sides at this thread. At first I just rolled my eyes but now I
>>> actually believe that Stealth Mode is either a troll or delusional. Please
>>> stop saying "ITSec". Any first year CS student knows what PoC is but you
>>> don't? Please.
>>>
>>> You are embarrassing yourself. Which institution did you get your
>>> degree? It must be a very old BSc indeed. You talk complete nonsense and
>>> have a fundamental misunderstanding of basic computer science tenets.
>>>
>>>
>>>
>>> On Tue, Oct 10, 2017 at 4:34 PM, Nomaan Ahmad <n0man@gmail.com>
>>> wrote:
>>>
>>> Nice hat there. Stealth might get this one though:
>>> https://i.imgur.com/329jfXt.gif
>>>
>>>
>>>
>>> On 10 Oct 2017 4:29 pm, "PistonMiner" <pistonmi...@gmail.com> wrote:
>>>
>>> The person in question should never have written a message about an open
>>> vulnerability into a public mailing list in the first place. Just because
>>> they did doesn't mean that you should ask for PoCs in public mailing lists,
>>> there's a multitude of issues with that.
>>> To make it perfectly clear, I'm not defending this person, I seriously
>>

Re: [Csgo_servers] Custom files exploit

2017-10-10 Thread Ryan Bentley
My sides at this thread. At first I just rolled my eyes but now I actually
believe that Stealth Mode is either a troll or delusional. Please stop
saying "ITSec". Any first year CS student knows what PoC is but you don't?
Please.

You are embarrassing yourself. Which institution did you get your degree?
It must be a very old BSc indeed. You talk complete nonsense and have a
fundamental misunderstanding of basic computer science tenets.

On Tue, Oct 10, 2017 at 4:34 PM, Nomaan Ahmad  wrote:

> Nice hat there. Stealth might get this one though: https://i.imgur.com/
> 329jfXt.gif
>
> On 10 Oct 2017 4:29 pm, "PistonMiner"  wrote:
>
>> The person in question should never have written a message about an open
>> vulnerability into a public mailing list in the first place. Just because
>> they did doesn't mean that you should ask for PoCs in public mailing lists,
>> there's a multitude of issues with that.
>> To make it perfectly clear, I'm not defending this person, I seriously
>> doubt the seriousness of their statements and a lot of what they're saying
>> makes no sense at all and looks like trying to maintain an image of
>> competence while knowing little, but responsible disclosure still applies.
>> If this person has a vulnerability to report, they should do so with the
>> information listed at http://www.valvesoftware.com/security/.
>> And I think I know what I'm talking about seeing as I have two Finder's
>> Fees. See https://wiki.teamfortress.com/wiki/Finder%27s_Fee and
>> https://wiki.teamfortress.com/wiki/List_of_Finder%27s_Fee_owners
>>
>> On 10.10.2017 17:08, Vaya wrote:
>>
>> I think someone needs to ‘stealth mode’ out of this email chain. This is
>> just noise without a repeatable Test
>>
>> Sent from my iPhone
>>
>> On 10 Oct 2017, at 16:01, PistonMiner  wrote:
>>
>> If you have a vulnerability to report, don't do it in a public mailing
>> list. Report it directly to Valve, and no place else. This conversation has
>> so many problems, but asking for a PoC in a *public* mailing list is one
>> of them. Look up responsible disclosure. (I should note though, at this
>> point I am not convinced a vulnerability even exists.)
>>
>> --
>> PistonMiner (Linus S.)
>>
>> ___
>> Csgo_servers mailing list
>> Csgo_servers@list.valvesoftware.com
>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>>
>>
>>
>> ___
>> Csgo_servers mailing 
>> listCsgo_servers@list.valvesoftware.comhttps://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>>
>>
>> --
>> PistonMiner (Linus S.)
>>
>>
>> ___
>> Csgo_servers mailing list
>> Csgo_servers@list.valvesoftware.com
>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>>
>
> ___
> Csgo_servers mailing list
> Csgo_servers@list.valvesoftware.com
> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>
___
Csgo_servers mailing list
Csgo_servers@list.valvesoftware.com
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers

Re: [Csgo_servers] Update

2016-02-17 Thread Ryan Bentley
Is planting on top of the silos in A intentional?

On Thu, Feb 18, 2016 at 3:23 AM, Vitaliy Genkin 
wrote:

> CS:GO client, servers, and SDK have been updated to version 1.35.2.1
> Previous build has been pinned as "jan_27" label.
>
> Release notes for the latest update can be found here:
> http://blog.counter-strike.net/index.php/2016/02/13629/
>
> GL HF!
>
> ___
> Csgo_servers mailing list
> Csgo_servers@list.valvesoftware.com
> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>
___
Csgo_servers mailing list
Csgo_servers@list.valvesoftware.com
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers

Re: [Csgo_servers] Warning: Table modelprecache is full, can't add

2015-12-28 Thread Ryan Bentley
"Hail Minecraftia" why are you such a bitter little NEET? In my experience,
those that little others intelligence carry very little of their own.
___
Csgo_servers mailing list
Csgo_servers@list.valvesoftware.com
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers

Re: [Csgo_servers] Notice of changes to CS:GO Game Server Operation

2015-10-13 Thread Ryan Bentley
What is the purpose of this update?

On Wednesday, 14 October 2015, Ido Magal  wrote:

> Notice of changes to CS:GO Game Server Operation
> --
>
> *CS:GO dedicated servers will soon require Steam Game Server Login Tokens
> (GSLTs). *This is the existing system that TF2 uses for Favorites
> migration.
>
>
>
> This transition will happen in three stages:
>
> §  Stage 1 *[NOW]* : The GSLT creation utility goes live:
> https://steamcommunity.com/dev/managegameservers. Please test the
> interface and report back any issues in creating accounts. Note that TF2
> server operators can now use this form to create GSLTs for TF2 (AppId 440).
>
> §  Stage 2: An update to CS:GO's dedicated server will include the
> sv_setsteamaccount convar that allows you to log in with your GSLT. In this
> stage it will still be possible to run a dedicated server without a GSLT.
> Anonymous login will happen automatically if no game server login token is
> specified. Please report back any issues with logging in using the game
> server login token or otherwise.
>
> §  Stage 3: Anonymous logins will be disabled in CS:GO. Please report
> back any issues.
>
>
> --
>
> Please ask questions in this thread.
>
> Cheers.
>
>
>
>
>
>
>
___
Csgo_servers mailing list
Csgo_servers@list.valvesoftware.com
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers

Re: [Csgo_servers] Notice of changes to CS:GO Game Server Operation

2015-10-13 Thread Ryan Bentley
It appears we also need to provide a valid phone number during the process.
What is the goal behind this change?

On Wednesday, 14 October 2015, Absurd Minds <goabs...@absurdminds.net>
wrote:

> So does this mean I can't run a CS:GO server unless I own CS:GO?
>
> On Tue, Oct 13, 2015 at 8:21 PM, Ryan Bentley <rdp...@gmail.com
> <javascript:_e(%7B%7D,'cvml','rdp...@gmail.com');>> wrote:
>
>> What is the purpose of this update?
>>
>>
>> On Wednesday, 14 October 2015, Ido Magal <i...@valvesoftware.com
>> <javascript:_e(%7B%7D,'cvml','i...@valvesoftware.com');>> wrote:
>>
>>> Notice of changes to CS:GO Game Server Operation
>>> --
>>>
>>> *CS:GO dedicated servers will soon require Steam Game Server Login
>>> Tokens (GSLTs). *This is the existing system that TF2 uses for
>>> Favorites migration.
>>>
>>>
>>>
>>> This transition will happen in three stages:
>>>
>>> §  Stage 1 *[NOW]* : The GSLT creation utility goes live:
>>> https://steamcommunity.com/dev/managegameservers. Please test the
>>> interface and report back any issues in creating accounts. Note that TF2
>>> server operators can now use this form to create GSLTs for TF2 (AppId 440).
>>>
>>> §  Stage 2: An update to CS:GO's dedicated server will include the
>>> sv_setsteamaccount convar that allows you to log in with your GSLT. In this
>>> stage it will still be possible to run a dedicated server without a GSLT.
>>> Anonymous login will happen automatically if no game server login token is
>>> specified. Please report back any issues with logging in using the game
>>> server login token or otherwise.
>>>
>>> §  Stage 3: Anonymous logins will be disabled in CS:GO. Please report
>>> back any issues.
>>>
>>>
>>> --
>>>
>>> Please ask questions in this thread.
>>>
>>> Cheers.
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>
>> ___
>> Csgo_servers mailing list
>> Csgo_servers@list.valvesoftware.com
>> <javascript:_e(%7B%7D,'cvml','Csgo_servers@list.valvesoftware.com');>
>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>>
>
>
___
Csgo_servers mailing list
Csgo_servers@list.valvesoftware.com
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers

[Csgo_servers] 128 tickrate settings, server rates config

2015-10-05 Thread Ryan Bentley
Does anyone have a 128 tick pug-suitable server.cfg I can glimpse at? Not
sure if the command line argument -tickrate is sufficient?
___
Csgo_servers mailing list
Csgo_servers@list.valvesoftware.com
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers

Re: [Csgo_servers] 128 tickrate settings, server rates config

2015-10-05 Thread Ryan Bentley
Do they include cmdrate and update rate commands?

On Monday, 5 October 2015, Absurd Minds <goabs...@absurdminds.net> wrote:

> Cevo and ESL both release their configs.
> On Oct 5, 2015 4:55 PM, "Ryan Bentley" <rdp...@gmail.com
> <javascript:_e(%7B%7D,'cvml','rdp...@gmail.com');>> wrote:
>
>> Does anyone have a 128 tick pug-suitable server.cfg I can glimpse at? Not
>> sure if the command line argument -tickrate is sufficient?
>>
>> ___
>> Csgo_servers mailing list
>> Csgo_servers@list.valvesoftware.com
>> <javascript:_e(%7B%7D,'cvml','Csgo_servers@list.valvesoftware.com');>
>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>>
>
___
Csgo_servers mailing list
Csgo_servers@list.valvesoftware.com
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers

Re: [Csgo_servers] Failed to connect to Server.Can't find issue.

2015-10-02 Thread Ryan Bentley
You have not provided any output.

On Fri, Oct 2, 2015 at 7:49 PM, Voxen  wrote:

> Hello fellow server admins,
> i recently got a strange issue with my CSGO server.
> It doesn't run sourcemod and it is basically a fresh installed server.
> i installed it with the LGSM from here:  LGSM
> 
>
> Here is the Debug output from the Server Console
> and the Client Output while connecting.
>
>
>
>
>
>
>
> --
> View this message in context:
> http://csgo-servers.1073505.n5.nabble.com/Failed-to-connect-to-Server-Can-t-find-issue-tp10152.html
> Sent from the CSGO_Servers mailing list archive at Nabble.com.
>
> ___
> Csgo_servers mailing list
> Csgo_servers@list.valvesoftware.com
> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>
___
Csgo_servers mailing list
Csgo_servers@list.valvesoftware.com
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers