Just be glad he hasn't figured out how to abuse allow upload using spray
paint images/custom spray paints or packet injections to place null.wav
named binary into your physical hardware.

On Wed, Apr 18, 2018, 20:46 Stealth Mode <stealthmode1...@gmail.com> wrote:

> The top part of that is calling to a memory address location in
> hexidecimal where null.wav is stored. Without null.wav on the server it
> eats up cycles to search for it in memory.
>
> Can create a bash script to look for keywords in this script and
> automatically ban the MAC ADDRESS. Not the IP address (takes some
> translation from decimal to hexidecimal).
>
> Cough Valve AntiCheat/Alfred hope you see this.
>
> -Stealthmode
>
> On Wed, Apr 18, 2018, 20:37 Stealth Mode <stealthmode1...@gmail.com>
> wrote:
>
>> Thanks God for sandbox virtual machine environments to run servers in.
>> That's all I will say.
>>
>> On Wed, Apr 18, 2018, 20:35 Stealth Mode <stealthmode1...@gmail.com>
>> wrote:
>>
>>> Think about this carefully. This client is able to inject scripts
>>> through the server to all clients. I warned this list months ago about how
>>> unsecure these servers really are. That can easily be a different script
>>> through a spoofed steamid that randomly changes. Image injections. Packet
>>> injections. Script injections. I'd be more worried about what he can use
>>> the server to inject into the OS cmd shell/powershell.
>>>
>>> These servers are really vulnerable from a network security standpoint.
>>> Be glad your client isn't malicious. Or your server and all of those
>>> clients could be remote hijacked.
>>>
>>> -Stealthmode
>>>
>>> On Wed, Apr 18, 2018, 17:42 Nathaniel Theis <ntth...@gmail.com> wrote:
>>>
>>>> hook recvmsg and kick if you get more than one signon message on a
>>>> given cnetchan (might need to check the server count though, not sure
>>>> if you get another signon message from legit clients at map
>>>> change...)?
>>>>
>>>> (normal connection throttling should stop the obvious workaround (just
>>>> reconnecting)
>>>>
>>>> On Tue, Apr 17, 2018 at 1:22 PM, iNilo <inilo.in...@gmail.com> wrote:
>>>> > A player on my server was able to spam all the clients with a script
>>>> he
>>>> > later linked ( https://hastebin.com/fufarowuba.cpp )
>>>> >
>>>> > its causing massive console spams.
>>>> >
>>>> > https://i.imgur.com/nOWLkeq.png
>>>> >
>>>> > Someone has a fix for this?
>>>> >
>>>> > - iNilo.
>>>> >
>>>> >
>>>> > _______________________________________________
>>>> > Csgo_servers mailing list
>>>> > Csgo_servers@list.valvesoftware.com
>>>> > https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>>>>
>>>> _______________________________________________
>>>> Csgo_servers mailing list
>>>> Csgo_servers@list.valvesoftware.com
>>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>>>
>>>
_______________________________________________
Csgo_servers mailing list
Csgo_servers@list.valvesoftware.com
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers

Reply via email to