Just be glad he hasn't figured out how to abuse allow upload using spray paint images/custom spray paints or packet injections to place null.wav named binary into your physical hardware.
On Wed, Apr 18, 2018, 20:46 Stealth Mode <stealthmode1...@gmail.com> wrote: > The top part of that is calling to a memory address location in > hexidecimal where null.wav is stored. Without null.wav on the server it > eats up cycles to search for it in memory. > > Can create a bash script to look for keywords in this script and > automatically ban the MAC ADDRESS. Not the IP address (takes some > translation from decimal to hexidecimal). > > Cough Valve AntiCheat/Alfred hope you see this. > > -Stealthmode > > On Wed, Apr 18, 2018, 20:37 Stealth Mode <stealthmode1...@gmail.com> > wrote: > >> Thanks God for sandbox virtual machine environments to run servers in. >> That's all I will say. >> >> On Wed, Apr 18, 2018, 20:35 Stealth Mode <stealthmode1...@gmail.com> >> wrote: >> >>> Think about this carefully. This client is able to inject scripts >>> through the server to all clients. I warned this list months ago about how >>> unsecure these servers really are. That can easily be a different script >>> through a spoofed steamid that randomly changes. Image injections. Packet >>> injections. Script injections. I'd be more worried about what he can use >>> the server to inject into the OS cmd shell/powershell. >>> >>> These servers are really vulnerable from a network security standpoint. >>> Be glad your client isn't malicious. Or your server and all of those >>> clients could be remote hijacked. >>> >>> -Stealthmode >>> >>> On Wed, Apr 18, 2018, 17:42 Nathaniel Theis <ntth...@gmail.com> wrote: >>> >>>> hook recvmsg and kick if you get more than one signon message on a >>>> given cnetchan (might need to check the server count though, not sure >>>> if you get another signon message from legit clients at map >>>> change...)? >>>> >>>> (normal connection throttling should stop the obvious workaround (just >>>> reconnecting) >>>> >>>> On Tue, Apr 17, 2018 at 1:22 PM, iNilo <inilo.in...@gmail.com> wrote: >>>> > A player on my server was able to spam all the clients with a script >>>> he >>>> > later linked ( https://hastebin.com/fufarowuba.cpp ) >>>> > >>>> > its causing massive console spams. >>>> > >>>> > https://i.imgur.com/nOWLkeq.png >>>> > >>>> > Someone has a fix for this? >>>> > >>>> > - iNilo. >>>> > >>>> > >>>> > _______________________________________________ >>>> > Csgo_servers mailing list >>>> > Csgo_servers@list.valvesoftware.com >>>> > https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers >>>> >>>> _______________________________________________ >>>> Csgo_servers mailing list >>>> Csgo_servers@list.valvesoftware.com >>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers >>> >>>
_______________________________________________ Csgo_servers mailing list Csgo_servers@list.valvesoftware.com https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers