I'm unable to find any information on this 'ownedgroup' which
apparently released this rcon hack.

On Tue, Jun 22, 2010 at 9:48 AM, Shane Arnold <[email protected]> wrote:
> How is updating a firewall to secure a server a pain in the ass?
>
> Perhaps you should of said "normal" server owners are slack? Windows is
> point and click and iptables is one line of text (a lot shorter than
> this email). I'd also imagine pretty much damn near all GSP's use a
> static IP system, and you'll find the minority of people experiencing
> RCON hack attempts are people at home on dynamic IP DSL connections
> being hacked.
>
> **On 22/06/2010 7:32 AM, Rothgar wrote:
>> Yeah that sounds like the best method of doing it.
>>
>> I am not sure if someone could hook rcon attempts and make some sort of
>> whitelist system? Through SourceMod or MetaMod or something.
>>
>> Updating firewall rules would be a PITA for normal server owners and
>> especially GSP's, also with a number of people probably not having static
>> IP's however I'm sure it works well for people who have static IP's and have
>> access to firewalls.
>>
>> --------------------------------------------------
>> From: "Matthew Lyons"<[email protected]>
>> Sent: Monday, June 21, 2010 4:17 PM
>> To: "Half-Life dedicated Win32 server mailing list"
>> <[email protected]>
>> Subject: Re: [hlds] HD Counte Strike Source: RCON HACKER
>>
>>
>>> There are other videos on YT of similar hacks all look to use the same
>>> process.
>>>
>>> 1) Install either a 3rd party plugin or dll to a CSS client installation.
>>> 2) Run the modified CSS client
>>> 3) On CSS client invoke the plugin/hack via console command
>>> 4) Minimise and run a separate windows executable that prompts for a
>>> servers IP:port
>>> 5) After entering an IP:port combination about 4-5 lines of "Decrypting
>>> rcon password" progress bars show
>>> 6) After about 5s the server name, ip and rcon password are displayed
>>> 7) In the video he does this about 4 times and successfully connects to 3
>>> of the servers (4th had blocked the port so HLSW timed out).
>>>
>>> All related videos on YT showed a similar process.
>>>
>>> Block your rcon ports or setup a firewall allowing only a whitelist of IPs
>>> to pass through it.
>>>
>>> I doubt valve will fix this, they are moving CSS to OB and this is just
>>> another incentive for them to do so.
>>>
>>> --
>>> Matt Lyons
>>> Content Administrator, games.on.net
>>> Email: [email protected]
>>> Web: http://games.on.net
>>> "In theory, there is no difference between theory and practice; In
>>> practice, there is."
>>>
>>>
>>>
>>> _______________________________________________
>>> To unsubscribe, edit your list preferences, or view the list archives,
>>> please visit:
>>> http://list.valvesoftware.com/mailman/listinfo/hlds
>>>
>>>
>> _______________________________________________
>> To unsubscribe, edit your list preferences, or view the list archives, 
>> please visit:
>> http://list.valvesoftware.com/mailman/listinfo/hlds
>>
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives, please 
> visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds
>

_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds

Reply via email to