We've already posted the packet format, the beep character and how to  
make it untraceable in another topic on here.

You're a bit late-- let's hope Valve fixes it now, eh? :D

Sent from my iPhone

On 4 May 2009, at 10:30, "Unknown | zD." <[email protected]> wrote:

> I have exploit of the attack but I will not make it in public as I
> have told to the valve community / steam support. We have recorded the
> attack by using this exploit many times ago (that means I am not the
> only one have the exploit but others also have it and it existed for a
> long time already), as its not just working in TF2, but in all valve
> game dedicated server including HL1, CS 1.6, HL2DM, TFC, TF2, ZPS and
> L4D (actually all the game engines including GoldSource engine, Source
> engine, Source 2007 engine and Source 2007 U1 engine). Please make
> sure that you have done any one of the following workaround to prevent
> the DoS attack.
> - Patch you engine.dll by replacing the string (A2C_PRINT from %s :
> %s) and then start the server with -console parameter, make sure that
> the A2C_PRINT command / string will not be proceeded / printed out
> - Remove / disable the beep sound driver (beep.sys) via devmgmt.msc /
> delete the file manually
> - Start your server in GUI mode only (not start with -console
> parameter, remove -console parameter from the starting line)
>
> In addition, if the guy is just sending some normal string to you
> without using any special character, then its harmless as that will
> not use much resources from the machine. All they need to get the
> exploit / DoS method works is by sending some special character to
> your server console and let them printing out. So I think the plugin
> will definitely stop the attack as it can block the non-printable
> characters, make sure that you don't block the normal string / other
> normal characters as the master server may try to use it if the normal
> encrypted protocol / normal command does not work.
>
> btw, I still have no idea why valve still doesn't fix the exploit /
> problem that existed for a long time ago and still not remove that
> command as its useless. That command was working since HL1 is out. If
> valve really doesn't want to fix the issue, I will give the exploit
> out for forcing them to fix their own problem.
>
> btw, someone was saying that the beep sound driver (beep.sys) is not
> related as the beep sound is produced by a client that is the same
> room as them .... I can tell you that this is not true as the exploit
> needs to use the beep sound driver (beep.sys) to get works ... a good
> evidence is the exploit doesn't work on any valve game dedicated
> server that has built on Windows Vista / Windows Server 2008 as WS2008
> has removed that driver already / not enabled by default. btw, the
> attacker is not required to be in game / in the same room as them as
> the command is a connectionless packet (not connective and encrypted)
> so I can tell you that that is not true. The exploit doesn't only work
> in LAN environment but also in internet / WAN environment so "is the
> server a backyard dedicated server?" really doesn't matter as it works
> on the most internet servers. In addition, the guy that has answered
> me is not a bot lol I have seen his name before on official steam
> forum and I know that he is an administrator of that forum. I couldn't
> tell you anymore about that problem as people can even use those
> information to start the attack ..... so I will not give out any more
> information until valve have fixed it.
>
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list  
> archives, please visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds

_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds

Reply via email to