just let your server get hacked if you cant even figure out how to avoid this.
The myg0t community joined a server and gave themselves SuperAdmin and banned all the other admins, how can it be prevented, how is it done, and is it an old exploit needing to be fixed.
Much thanks.
- Blarg
just let your server get hacked if you cant even figure out how to avoid this.
Why is it that it seems like the only people who post here flame, make false claims, and never have anything of actual use to say? OP, I wish I could help but unfortunately I don't know how people are stealing RCON these days I was trying to figure it out the other day for myself. My advice is to contact your provider (gameservers, nfoservers, etc.) and have them reset it or do it yourself through ftp if you know how and hopefully they won't target you again. I'm sorry this happened to you and good luck!
Do what fear said or just use teh console. I paid someone on myg0t for a rcon hack but it was all A SHAMMM.
it comes from an unspecified rcon password in the cfg
a method i used to use was ulx userallow "ulx userallow"
all they do is download their cfg folder and use rcon to ulx adduser nerd superadmin 1, not that complex
8:53 PM - Xenomorphic 1 hr 7 min cooldown: So is MPGH only exist so people can c+p from ************* and troll the gmod section?
[IMG]https://i739.photobucke*****m/albums/xx38/jorroa5990/flatexch2_zpsec96a7e2.gif[/IMG]
"get owned myg0t"
"myg0t tell me how to rcon hack"
Last edited by horsenipple; 09-11-2013 at 04:49 AM.
From what i understand there isn't any sort of RCON hack going around, what happened is a bunch of people posted addon's with back doors coded into them. Then if a server had one of those addon's anyone with knowledge of it could use that back door to execute code on the server.
How would you just download a servers config file?
you cant anymore i dont think
If you're curious how an exploit is done and have a popular server at your usage do these steps:
1. Log every packet to go in and out of the server
2. Log every server interaction
(Optional)3. Invade your user's privacy and make LUA script(s) that takes a crapton of screenshots n' such.
4. When the exploit is done see what was logged and look for inconsistencies in the logs or anything interacting with the user(s) suspected to be doing an exploit.