Page 2 of 3 FirstFirst 123 LastLast
Results 16 to 30 of 44
  1. #16
    mirnes15's Avatar
    Join Date
    Aug 2008
    Gender
    male
    Location
    US,NY,UTICA
    Posts
    27
    Reputation
    10
    Thanks
    3
    My Mood
    Fine
    Ok so what you're saying is we make our own CA, get sued by Nexon and arrested great idea, just not for the arrest part. I like that you figured a way
    to do a trendiness thing like this but really dude! Nexon will be ontop of our asses if MPGH did something like this. It would be the end of the site.



  2. #17
    Impakt's Avatar
    Join Date
    Dec 2009
    Gender
    male
    Location
    Multi-section poster.
    Posts
    210
    Reputation
    12
    Thanks
    15
    Quote Originally Posted by mirnes15 View Post
    Ok so what you're saying is we make our own CA, get sued by Nexon and arrested great idea, just not for the arrest part. I like that you figured a way
    to do a trendiness thing like this but really dude! Nexon will be ontop of our asses if MPGH did something like this. It would be the end of the site.


    @mirnes15
    It wouldn't be our own Combat Arms, it would be our own client. Like how trainers work on games like Adventure Quest or something.

  3. #18
    Lattice's Avatar
    Join Date
    Aug 2011
    Gender
    male
    Posts
    3
    Reputation
    10
    Thanks
    0
    If you need to ask what this is, or what it's for it's probably above you anyway

  4. #19
    restlessluk's Avatar
    Join Date
    Aug 2011
    Gender
    female
    Posts
    22
    Reputation
    10
    Thanks
    0
    would this change if nexon updated the game

  5. #20
    xx404xx's Avatar
    Join Date
    Aug 2011
    Gender
    male
    Posts
    9
    Reputation
    10
    Thanks
    8
    The key's normally are only changed when there usage period's expire's,and to those who don't understand this mean's that if a hacked client is made once, nexon will be unable to patch it with just a revision change,so basically they then have to revoke there own key,make a new key and distribute them to an updated client.The only thing is, if we get the key before they change it and we get it working,we can patch client's that use the old key's to use the new key's,or just patch them to appear as the latest update.

    And to those who said nexon would shut this site down,think about how wow/rs/many other mmo's have private server's with huge player bases and owner's who make upward's of 1g a month(For "DONATION'S" as they call them),so why not C.A.

    Here's an example, if we can patch there client's we can turn off hack-shield so we don't need a bypass to use DLL's.If we get the key's we can patch the client directly,without the need of Patcher's/DLL'S. Also,you have a lot more to work with when you'r "hack" is a piece of "Trusted" Code within nexon's client, basically with the key's you are the able to generate code that the client think's is From Nexon,when it was made by insert your name here instead.

  6. The Following 2 Users Say Thank You to xx404xx For This Useful Post:

    maniac16 (08-25-2011),restlessluk (08-22-2011)

  7. #21
    xx404xx's Avatar
    Join Date
    Aug 2011
    Gender
    male
    Posts
    9
    Reputation
    10
    Thanks
    8
    Updated with new info,and my time attack challenge.

    http://www.mpgh.net/forum/207-combat...-6-9-11-a.html

  8. #22
    freedompeace's Avatar
    Join Date
    Jul 2010
    Gender
    female
    Posts
    3,035
    Reputation
    340
    Thanks
    2,784
    My Mood
    Sad
    @OP, Unless Nexon are absolutely stupid, you can't obtain the private key. Nice work though.

    Quote Originally Posted by xx404xx View Post
    The key's normally are only changed when there usage period's expire's,and to those who don't understand this mean's that if a hacked client is made once, nexon will be unable to patch it with just a revision change
    If we (or you) ever obtain Nexon's private key, Nexon can cause a chain of events that leads to revocation of the current key, rendering all our efforts wasted. This will ripple down through the official and trusted CA revocation lists down to every modern computer, browser and device in existence.

    Quote Originally Posted by xx404xx View Post
    Here is the read key command for openssl

    Edit:There's still the Verisign problem also,unless someone happen's to find valid cert's somehow.

    Edit2:Verisign has been hacked before,and im pretty sure this hash exploit is still out there that would let us generate %100 valid cert's.

    Researchers hack VeriSign's SSL scheme for securing Web sites - Computerworld
    The researchers notified Verisign of the flaw before the presenting the matter for the speech at a security conference. Verisign and all other CAs have updated their schemes to use the SHA (SHA-1 minimum) rather than MD5 as their designated hashing algorithm.

  9. The Following User Says Thank You to freedompeace For This Useful Post:

    spookyskunkk (08-29-2011)

  10. #23
    xx404xx's Avatar
    Join Date
    Aug 2011
    Gender
    male
    Posts
    9
    Reputation
    10
    Thanks
    8
    I believe this was after it was proven you could beat MD5 making 2 prog's with different function's but the same MD5......
    Last edited by xx404xx; 08-25-2011 at 03:12 AM.

  11. #24
    freedompeace's Avatar
    Join Date
    Jul 2010
    Gender
    female
    Posts
    3,035
    Reputation
    340
    Thanks
    2,784
    My Mood
    Sad
    Quote Originally Posted by xx404xx View Post
    I believe this was after it was proven you could beat MD5 making 2 prog's with different function's but the same MD5......
    Of course. MD5 was never built for complete security - it had speed in mind. Of course, now, we have multi-core GPUs that can computer billions of hashes a second, so that's kind of... well... death for MD5 security.

    That's also why so many security professionals are strongly advocating the use of bcrypt, a variable difficulty hashing algorithm to store passwords. Rather than a few billion hashes a second, we can change the workload for our bcrypt hash to take 10 times, 100 times or even 1,000,000 times more than MD5, meaning we can keep up with new and powerful hardware (that consequently would have otherwise made brute forcing hashes a lot easier if not for variable workload algorithms).

  12. The Following 2 Users Say Thank You to freedompeace For This Useful Post:

    Almightynub (10-09-2011),spookyskunkk (08-29-2011)

  13. #25
    xx404xx's Avatar
    Join Date
    Aug 2011
    Gender
    male
    Posts
    9
    Reputation
    10
    Thanks
    8
    Sony is only 1 example,texas instrument got there private key's for some board's leaked as well as various other examples.
    Not fully true,even huge company's like sony that have spent MILLION's of dollar's on development have had there private key uncovered and leaked.I do somewhat agree though at the same time,as making an insecure system is like making a lock that can be picked easily, the strong "lock's" or in other word's algorithm's shouldn't be easily or at all picked.

    Quote Originally Posted by freedompeace View Post
    @OP, Unless Nexon are absolutely stupid, you can't obtain the private key. Nice work though.



    If we (or you) ever obtain Nexon's private key, Nexon can cause a chain of events that leads to revocation of the current key, rendering all our efforts wasted. This will ripple down through the official and trusted CA revocation lists down to every modern computer, browser and device in existence.



    The researchers notified Verisign of the flaw before the presenting the matter for the speech at a security conference. Verisign and all other CAs have updated their schemes to use the SHA (SHA-1 minimum) rather than MD5 as their designated hashing algorithm.

  14. #26
    freedompeace's Avatar
    Join Date
    Jul 2010
    Gender
    female
    Posts
    3,035
    Reputation
    340
    Thanks
    2,784
    My Mood
    Sad
    Quote Originally Posted by xx404xx View Post
    Not fully true,even huge company's like sony that have spent MILLION's of dollar's on development have had there private key uncovered and leaked.I do somewhat agree though at the same time,as making an insecure system is like making a lock that can be picked easily, the strong "lock's" or in other word's algorithm's shouldn't be easily or at all picked.
    Bad (no) security on Sony's part is not representative of the entire industry. It is impossible to uncover the private key with the public key alone without a hypercomputer.

    I mean, Sony even let me get into their system as root (*NIX admin) without much effort...

  15. #27
    phooj's Avatar
    Join Date
    Sep 2010
    Gender
    male
    Location
    .................:::::::::::::::::::::::::|||||||||||||||||||||||||||||||||||||||||||||||!!!!!!!!!!!
    Posts
    75
    Reputation
    7
    Thanks
    3
    LOL Thanks now i can convert it > HEEHE IMA HACK NEXON >DDD EVIL EVIL EVIL!! hehe thanks now i can make a knew thing and combine it with mine thanks ;Dchewheheheheheeh SSOOO HAPPY DANKE THANK YOU

  16. #28
    spookyskunkk's Avatar
    Join Date
    Aug 2010
    Gender
    male
    Location
    Wilmington, California
    Posts
    212
    Reputation
    10
    Thanks
    13
    Quote Originally Posted by phooj View Post
    LOL Thanks now i can convert it > HEEHE IMA HACK NEXON >DDD EVIL EVIL EVIL!! hehe thanks now i can make a knew thing and combine it with mine thanks ;Dchewheheheheheeh SSOOO HAPPY DANKE THANK YOU
    HAHAHAHAHAHAHAHAH....i look at you with a grin HAHAHAHAHAHAHH You sir have no ida what your talking about...THIS ISN'T AN INJECTABLE HACK THAT YOU THINK YOU CAN COMPILE HAHAHAH. @phooj
    Last edited by spookyskunkk; 08-29-2011 at 10:39 PM.


    I currently don't have xBox live....ill try to renew it...
    If you need help with hacks or what to get started with them and dont know what the F*#k is happening Feel free to send me a message via: PM or VM
    Or message me at Gr1mCrEEpEr@live.com (i might not reply here because i dont check it offten..)

  17. #29
    fragbox's Avatar
    Join Date
    Aug 2009
    Gender
    male
    Location
    oregon
    Posts
    310
    Reputation
    9
    Thanks
    25
    My Mood
    Aggressive
    Quote Originally Posted by spookyskunkk View Post
    HAHAHAHAHAHAHAHAH....i look at you with a grin HAHAHAHAHAHAHH You sir have no ida what your talking about...THIS ISN'T AN INJECTABLE HACK THAT YOU THINK YOU CAN COMPILE HAHAHAH. @phooj
    LOL CRACKED MY ASS OFF WHEN I RED THAT
    Actions speak louder than words.

    CounterStrike:GlobalOffensive

    Learning C++ currently, then i'll start producing some simple hacks/tools for counterstrike


  18. #30
    _Fk127_'s Avatar
    Join Date
    Nov 2010
    Gender
    male
    Posts
    724
    Reputation
    16
    Thanks
    208
    My Mood
    Bitchy
    Really guys, don't post if you have no idea what you are talking about



    Put this image in your signature if you support HTML5 development!

Page 2 of 3 FirstFirst 123 LastLast

Similar Threads

  1. Starcraft PRIVATE CD Key
    By arunforce in forum Buying Accounts/Keys/Items
    Replies: 0
    Last Post: 02-11-2010, 02:05 PM
  2. IS NEXON ENGINE.EXE A KEY LOGER ?
    By bigbadwolf in forum Combat Arms Hacks & Cheats
    Replies: 52
    Last Post: 06-16-2009, 05:40 PM
  3. have the public hacks been patched by nexon???
    By raw95 in forum Combat Arms Hacks & Cheats
    Replies: 2
    Last Post: 01-03-2009, 02:59 PM
  4. Mentals Private Hack for Public rofl
    By truffless in forum WarRock - International Hacks
    Replies: 29
    Last Post: 10-09-2007, 10:03 AM
  5. -=*Video* QuantumLeap V1.0 Private.=- Should it be public?
    By Methadone727 in forum WarRock - International Hacks
    Replies: 67
    Last Post: 05-30-2007, 06:42 PM