I guess the "shadow update" has fixed the exploit now?
It definitely looks like they didn't go quite far with the exploit (we
were hit by it aswell). I assume they downloaded the server.cfg to get
a hold of the rcon password, correct? And there probably is no trace
of any of this happening.
Would
Thanks for this Nicholas, I hope that pulling ND out of beta for Linux
and the other fixes will lure some new players to this great game, so
we can actually play some fun matches again online.
On Sun, Apr 20, 2014 at 9:23 PM, Nicholas Hastings
wrote:
> A mandatory update for Nuclear Dawn has been
What? it was .RU site - what could go wrong with that?
http://forums.pelicanparts.com/uploads22/941048597_free_candy_van1386440078.jpg
On Mon, Apr 21, 2014 at 12:09 PM, ics wrote:
> Just a worhy note for everyone, don't trust every site you see on the
> internet. No one knows if these sites w
Yes, this unfortunately impacted a lot of European CS:S servers
(L4D(2) and other engines will forever be compromised). Based on the
scope, everything the server's user was running as is compromised.
However, the running guess is that people were still only after quick
wins; such as changing the se
So was this used to obtain rcon passwords in other games such as TF2?
On Sat, Apr 19, 2014 at 9:45 PM, Tyrone wrote:
> The exploit works on all source based games according to Garry.
>
>
> On Fri, Apr 18, 2014 at 11:11 PM, wickedplayer494 > wrote:
>
>> http://facepunch.com/showthread.php?t=138681
5 matches
Mail list logo