Reminds me of Dauphins plugin system for source. Probably the same Dev
created that inventory mod plugin. Not many devz chose to use ! as a
command interpreter/variable.
The plugin isn't illegitimate. So they won't block it.
On Tue, Jul 10, 2018, 12:07 Ejziponken - wrote:
> Please devs, do
he Mac address of the proton VPN user now. I am
>> awaiting protons I.T. department to go through their server logs for the
>> Swiss proxy server they went through."
>>
>> Stealth is a 10/10 troll, I'm convinced. Bravo.
>>
>> On Tue, May 8, 2018 at 8:45 PM, Stealt
Like you said netcode bug that has been around for a long time. Kudos to
Dylan for developing a fix independently. And for you attempting to show
this mod team what is flawed in their product. Will this fix work for
higher latency users as well?
-Stealthmode
On Tue, May 8, 2018, 16:38 William
5 hashes on your PC through your browser or
> > email client. You're all doomed.
> >
> > Trust me, I have done PhD in hacking. I have branched off rocket
> > science into computer hacking.
> >
> > On Tue, 8 May 2018, 7:43 am Maxence S
BTW. Vitaliy. There is a lot of spam incoming from a porn bot to this list.
>From multiple domains. There is also someone using proton VPN and
protonmail to stalk, and harass people on this list. Please forward this
info to security.
Thanks in advance.
-Stealthmode
On Mon, May 7, 2018, 16:43
you.h...@gmail.com>
> wrote:
>
>> Are we doing this again?
>>
>> On Mon, May 7, 2018 at 6:41 PM, Stealth Mode <stealthmode1...@gmail.com>
>> wrote:
>>
>>> I was mapping before you knew what cs even was. Lmao. Ever hear of
>>> wor
Nevermind. I don't run the client. Don't have the resource files. I only
install these servers. I still play source. No offense. But a mod that
isn't as good as source isn't worth my time. The store is a vulnerability
too. Ever check those weapon skins? You'd be surprised what's embedded in
them.
your* their*
On Mon, May 7, 2018, 18:01 Stealth Mode <stealthmode1...@gmail.com> wrote:
> One additional feedback. Any chance tour environment mapping people can go
> through there maps? And fix the tears, collisions, and other high
> polygon/calculation areas? Meanin
maps to this email address. It
really isn't hard to line up faces, and vertices properly.
-Stealthmode
On Mon, May 7, 2018, 17:57 Stealth Mode <stealthmode1...@gmail.com> wrote:
> +1
>
> Great job getting this update coded, and patched quickly to address the
> issues.
>
>
+1
Great job getting this update coded, and patched quickly to address the
issues.
On Mon, May 7, 2018, 16:43 Vitaliy Genkin wrote:
> An optional stability update for CS:GO game servers to address several
> network exploits has been released with
>> to Steam, they were merely incremental.
>>
>> Signed, STEAM_0:1:12*** who knows that the MAC address on the ethernet
>> frame is only used in the local domain, and has worked in network
>> engineering for over 14 years.
>>
>> On 25 April 2018 at 08:35, S
to run your servers through a VMware/virtual
machine is always a good idea. It keeps the environment sandboxed to keep
the physical hardware from being damaged by malicious files/packets/scripts.
End of Discussion.
On Wed, Apr 25, 2018, 08:41 Stealth Mode <stealthmode1...@gmail.com> wrote
The Internet Protocol address is assigned by the operating system
contacting the network administration device which is normally a switch,
router, or hub. It checks these devices for a free Internet Protocol
address. And the packets the network sends has a footer and a header with
this IP
Lastly. To those posting steam_0:1 IDs. There is a few million people
between 0:0 and 0:1. You'd have to know how the algorithm works to
understand wonid to steamid conversion.
And since none have produced a wonid. None are qualified. Ignored.
On Wed, Apr 25, 2018, 08:30 Stealth Mode
with him is not a good use of your time.
>>
>> On Tue, Apr 24, 2018, 10:01 AM Michael Loveless <mloveless1...@gmail.com>
>> wrote:
>>
>>> Would you be so kind as to explain all of this in greater detail and
>>> with as many more words as possible,
to amateurs.
Cough global ops developers.
Have a good day.
-StealthMode
On Tue, Apr 24, 2018, 15:07 Stealth Mode <stealthmode1...@gmail.com> wrote:
> Before anyone else responds. What is a WONid? Nilo will remember. A few
> others might too. Mine was 2116995. It converted to Ste
hen he's antagonizing "Ajax". Dr. Francis Freeman. Very cool
Easter egg.
End of Communications.
-StealthMode
The Original
On Tue, Apr 24, 2018, 12:31 Stealth Mode <stealthmode1...@gmail.com> wrote:
> Mac addresses translate up to IP addresses. That's how they make it out of
each other. This is all basic
> network knowledge and easily searchable. Maybe you can provide a link to
> something that is the reason you think this way.
>
> Going back to lurker mode.
>
> On Tue, Apr 24, 2018 at 3:57 AM Stealth Mode <stealthmode1...@gmail.com>
> wrote:
&g
t; yourself every day.
>
> On Tue, Apr 24, 2018 at 9:25 AM, Stealth Mode <stealthmode1...@gmail.com>
> wrote:
>
>> Ok kids. Have fun trying to denounce without having the education, or
>> knowledge of electronics engineering + I.T. to even have a valid base to
>
Bentley <rdp...@gmail.com> wrote:
> Stealth, you are either a 10/10 troll or a seriously deluded person. You
> have less knowledge than a 1st year CS student.
>
> On Mon, Apr 23, 2018 at 6:47 AM, Stealth Mode <stealthmode1...@gmail.com>
> wrote:
>
>> Your Mac
machine.
On Sun, Apr 22, 2018, 01:39 Zaretti Steve <kosso...@gmail.com> wrote:
> you are right. You can only see the mac of the nearest switch/router.
> Stealth Mode is just spamming some random word.
>
> 2018-04-22 6:42 GMT+02:00 Mukunda Johnson <muku...@mukunda.com>:
Because it has already had a P.O.C. over 2 decades ago.
On Sun, Apr 22, 2018, 01:22 lay295 wrote:
> I really don't understand. You keep going on and on and on and on about how
> easy it is to exploit these servers, why don't you make a proof of concept
> attack and show it
o you should ban by IP.
>
> On Sat, Apr 21, 2018, 8:07 PM Stealth Mode <stealthmode1...@gmail.com>
> wrote:
>
>> The fix is to create a bash script that looks for that in the server log
>> (the repietitive call to null.wav), and automatically ban. If you push the
>>
Also, Alfred. This Samantha Smith bot extracting email addresses from this
list is getting annoying. And the Kathy Lisa porn spam is very
disheartening. The list needs purged cause a boy is parsing these emails.
For email addresses that third party porn bots are being loaded with. And
fake
The fix is to create a bash script that looks for that in the server log
(the repietitive call to null.wav), and automatically ban. If you push the
IP through a ip/decimal conversion tool you can make it a Mac address ban
right in the hardware packet/transport layer.
End of message.
On Thu, Apr
t think that is available to the
>> server.
>>
>> On 19 April 2018 at 01:46, Stealth Mode <stealthmode1...@gmail.com>
>> wrote:
>>
>>> The top part of that is calling to a memory address location in
>>> hexidecimal where null.wav is stored. Without null.wav
Just be glad he hasn't figured out how to abuse allow upload using spray
paint images/custom spray paints or packet injections to place null.wav
named binary into your physical hardware.
On Wed, Apr 18, 2018, 20:46 Stealth Mode <stealthmode1...@gmail.com> wrote:
> The top part of that i
(takes some
translation from decimal to hexidecimal).
Cough Valve AntiCheat/Alfred hope you see this.
-Stealthmode
On Wed, Apr 18, 2018, 20:37 Stealth Mode <stealthmode1...@gmail.com> wrote:
> Thanks God for sandbox virtual machine environments to run servers in.
> That's al
Thanks God for sandbox virtual machine environments to run servers in.
That's all I will say.
On Wed, Apr 18, 2018, 20:35 Stealth Mode <stealthmode1...@gmail.com> wrote:
> Think about this carefully. This client is able to inject scripts through
> the server to all clients. I warn
Think about this carefully. This client is able to inject scripts through
the server to all clients. I warned this list months ago about how unsecure
these servers really are. That can easily be a different script through a
spoofed steamid that randomly changes. Image injections. Packet
wrote:
> Stealth Mode wrote
> > This list has gotten hit with some kind of email bot. Alfred can you
> block
> > the person "Kate Stitch" from email address
>
> > katestitch@
>
> > ?
> > Every time I post to this list now the mail is getting responses
This would be the correct list to post this to.
https://list.valvesoftware.com/mailman/listinfo/hlmappers
On Mon, Nov 13, 2017 at 10:07 AM, Stealth Mode <stealthmode1...@gmail.com>
wrote:
> I would submit this to support. This isn't server related. This list is
> for serv
I would submit this to support. This isn't server related. This list is for
servers. The SDK, and Hammer specifically is a seperate issue non server
related. I've documented a number of Hammer errors. If you notice on
startup, there is a page or two of nothing but errors from missing hl2
files
valvesoftware.com/wiki/Counter-Strike:_
> Global_Offensive_Dedicated_Servers#Registering_Game_Server_Login_Token
>
>
>
> Am 11.11.2017 um 23:26 schrieb Cyborgium:
>
>> Stealth Mode wrote
>>
>>> Also, check out this thread on the steam forums.
>>>
>&
Also, check out this thread on the steam forums.
https://steamcommunity.com/discussions/forum/13/828939163961292409/
Especially the video related to part V, port forwarding and dmz-ing.
On Nov 11, 2017 4:08 PM, "Cyborgium" <a...@familiebrondijk.nl> wrote:
> Stealth Mode
Give these threads a read.
http://forums.srcds.com/showthread.php?tid=430=2073
http://forums.srcds.com/viewtopic/9206
On Nov 11, 2017 16:08, "Cyborgium" <a...@familiebrondijk.nl> wrote:
> Stealth Mode wrote
> > Cyborgium...
> >
> > DMZ in refe
It would imply your server is not sitting on the DMZ host of your router.
Or that your firewall (Internal router firewall) is blocking all traffic.
On Sat, Nov 11, 2017 at 4:05 PM, Cyborgium <a...@familiebrondijk.nl> wrote:
> Stealth Mode wrote
> > And if this was the error m
Cyborgium...
DMZ in reference to networking
https://en.wikipedia.org/wiki/DMZ_(computing)
On Sat, Nov 11, 2017 at 3:56 PM, Cyborgium <a...@familiebrondijk.nl> wrote:
> Stealth Mode wrote
> > Are you giving them your external IP address to connect to or the local
> &g
RE: bandwidth
Handy reference chart about halfway down the page for bandwidth
requirements.
https://support.steampowered.com/kb_article.php?ref=5386-HMJI-5162
On Sat, Nov 11, 2017 at 3:53 PM, Charalampos Galanis
wrote:
> Hello,
>
> I always wondered if the current players
Also, please check this handy GO server install reference and ensure you
are setting correct parameters, launch options.
https://developer.valvesoftware.com/wiki/Counter-Strike:_Global_Offensive_Dedicated_Servers
On Sat, Nov 11, 2017 at 3:52 PM, Stealth Mode <stealthmode1...@gmail.com>
Are you giving them your external IP address to connect to or the local
network IP address? Also the entire server needs to be sitting on the DMZ.
-Stealth
On Sat, Nov 11, 2017 at 3:50 PM, Cyborgium wrote:
> Hello,
>
> I set up my server fine, I can connect from my
Is anyone else getting hit with some kind of spam from a talkingmail.xyz
mail server when replying to this topic? I got hit with a bunch of personal
site ads when I replied to this topic.
Always run server OS, whether linux or windows. It is built to run better
with server type applications.
eg:
Forgot to mention. OS, linux is the smoothest, we ran redhat back in the
day, however I am sure ubuntu also runs well. Even Windows ran servers
decently. Its more of a familiarity, ease of use preference by the owner of
the server to be honest.
On Fri, Nov 10, 2017 at 2:16 PM, Stealth Mode
I will just say this. SRCDS was released in Oct. of 2003. The system specs
for that era were nowhere near what you are running your 5v5 scrim/practice
server on. Considering back then almost no os read over 3gb of ram to begin
with (os limitations of windows platforms). That said, the ticrate was
Server.cfg file used to accept this setting in hlds/srcds, guess that
changed in srcds for go. Had to set it at startup, not on the fly (live
server).
-Stealth
On Nov 6, 2017 18:11, "Ruben Gonzalez" wrote:
> You can set it as a launch param (+sv_disable_motd 0) if you
Alfred, please have whoever is moderating these lists monitor the list
better.
A recent topic posted about the custom file exploit vulnerability has
demonstrated a problem with list management/administration/moderation.
A number of persons on this list do not have a lot of education in
gt;>>
>>>
>>>
>>> Please demonstrate the issue, it be by posting the offending code, you
>>> recording a video showing a working exploit, or anything along these lines.
>>>
>>>
>>>
>>> You should know this, if you work in “the field
ote:
> My sides at this thread. At first I just rolled my eyes but now I actually
> believe that Stealth Mode is either a troll or delusional. Please stop
> saying "ITSec". Any first year CS student knows what PoC is but you don't?
> Please.
>
> You are embarrassing
will contact Alfred about the harrassment over the legitimate
exploit being being spoken of with other owners/admins.
-StealthMode
On Tue, Oct 10, 2017 at 11:08 AM, Vaya <dsenys...@gmail.com> wrote:
> I think someone needs to ‘stealth mode’ out of this email chain. This is
> just n
, epi <ow...@tf.heybey.org> wrote:
> PoC stands for Proof of Concept. We are asking you to provide proof that
> you are not just pasting random articles on PHP. You have yet to show us
> anything that would trigger any issues in srcds.
>
> On 10/10/2017 10:26 AM, Stealth Mode wro
Oct 10, 2017 9:20 AM, "Stealth Mode" <stealthmode1...@gmail.com> wrote:
>
>> Another set of examples
>>
>> https://securelist.com/png-embedded-malicious-payload-hidden
>> -in-a-png-file/74297/
>>
>> https://phocean.net/2013/09/29/fi
the exif tag and eval some PHP. How exactly would
> a similar situation occur on a hosted game server? Do you have a poc? You
> say this email chain is one but I dont think you quite know what you're
> talking about.
>
> On Oct 10, 2017 9:15 AM, "Stealth Mode" <stealthmo
ink you quite know what you're
> talking about.
>
> On Oct 10, 2017 9:15 AM, "Stealth Mode" <stealthmode1...@gmail.com> wrote:
>
>> This email is fine for a POC. Far as the exploit, for those who arent
>> familiar, this is an example.
>>
>> https://ww
Actually my information is grounded in fact and 100% replicatable if you
know the field. I've listed a few resources to educate yourself. Please
refrain from speaking if you do not have an education in ITSec.
=image%20file%20injection%20compromsing%20server=false
On Tue, Oct 10, 2017 at 5:19 AM, Saint K. <sai...@specialattack.net> wrote:
> Do you have a POC?
>
>
> * From: * Stealth Mode <stealthmode1...@gmail.com>
> * To: * <csgo_servers@list.valvesoftware.com>
ave a POC?
>
>
> * From: * Stealth Mode <stealthmode1...@gmail.com>
> * To: * <csgo_servers@list.valvesoftware.com>
> * Sent: * 10/10/2017 12:44 AM
> * Subject: * Re: [Csgo_servers] Custom files exploit
>
> Yes, IT skills. Electronics skills. And old sc
that you think it is a possible vector for a batch file to be
> executed after simply being put into memory shows how clueless you are. If
> you have anything productive please post, otherwise stop abusing computer
> security vernacular.
>
> -nfbush
>
> On 9 Oct 2017 11:47 p.m
nything to back this up? (don't take it the wrong way)
>
> Nilo.
>
> 2017-10-09 16:54 GMT+02:00 Stealth Mode <stealthmode1...@gmail.com>:
>
>> Headsup admins/owners. Might want to disable custom files till valve
>> addresses this issue brought to their attention a mo
n Mon, Oct 9, 2017 at 11:59 AM, iNilo <inilo.in...@gmail.com> wrote:
> Sure,
>
> But you have anything to back this up? (don't take it the wrong way)
>
> Nilo.
>
> 2017-10-09 16:54 GMT+02:00 Stealth Mode <stealthmode1...@gmail.com>:
>
>> Headsup admins/o
Headsup admins/owners. Might want to disable custom files till valve
addresses this issue brought to their attention a month ago.
There is an exploit where any client with minor skill can inject custom
files with all types of malicious code. From hacks in weapon skins, to
ransomware in custom
60 matches
Mail list logo