• Welcome to Valhalla Legends Archive.
 

Stealth Authorization Coding

Started by GoKiLLa, December 16, 2003, 04:20 PM

Previous topic - Next topic

GoKiLLa

Hey, I was just wondering where i can find the coding of the stealth athorization.  If any of u guys have it, can u play post it in this topic.

Kp

Quote from: GoKiLLa on December 16, 2003, 04:20 PM
Hey, I was just wondering where i can find the coding of the stealth athorization.  If any of u guys have it, can u play post it in this topic.

Specifically what are you referring to?  Offhand, I don't recall any way to do authorizations in a fashion that I would classify as "stealthy".
[19:20:23] (BotNet) <[vL]Kp> Any idiot can make a bot with CSB, and many do!

Crypticflare

I think he's trying to refer to the way stealthbot checks to see if the user can operate the bot. I believe Stealth uses a file stored on the internet to see if the user is banned or not. If he's banned the bot exits, or something along those lines.

Stealth

#3
MSINET.OCX pulls a textfile from my webhost (http://cold-chaos.net/stealth/sbauth.txt), splits its content by line break, and only connects to Battle.net if that username is present on the list.

It's quick, dirty, and easy to fool, but it suits my purposes.
- Stealth
Author of StealthBot

iago

Or you can just map the domain (www.cold-chaos.net) to 127.0.0.1, then run a webserver on your own computer that supplies it with your name :)
This'll make an interesting test for broken AV:
QuoteX5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*


Grok

This all makes me laugh.

*remembers when Adron's supersecret website password was hacked*

iago

Quote from: Grok on December 16, 2003, 06:53 PM
This all makes me laugh.

*remembers when Adron's supersecret website password was hacked*

haha yeah, I heard about that one.  L33t people, they were :)
This'll make an interesting test for broken AV:
QuoteX5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*


Stealth

Quote from: iago on December 16, 2003, 06:47 PM
Or you can just map the domain (www.cold-chaos.net) to 127.0.0.1, then run a webserver on your own computer that supplies it with your name :)

That's how I was thinking it could be fooled pretty easily. It helps that I release superior, public versions soon after my beta releases.
- Stealth
Author of StealthBot

iago

Quote from: Stealth on December 16, 2003, 09:35 PM
Quote from: iago on December 16, 2003, 06:47 PM
Or you can just map the domain (www.cold-chaos.net) to 127.0.0.1, then run a webserver on your own computer that supplies it with your name :)

That's how I was thinking it could be fooled pretty easily. It helps that I release superior, public versions soon after my beta releases.

I would recommend connecting by ip - it's a little harder to trick, I think.
This'll make an interesting test for broken AV:
QuoteX5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*