SRO Blitzkrieq -> Beginning

09/06/2011 20:59 OMGG1#166
bastard
09/06/2011 20:59 x*Manu*x#167
Quote:
Originally Posted by Getzabelz View Post
Maybe he wants you to leave all your IPs on their servers, so if they come to catch him, they will be able to look for your ips too :)
wow its your way how you got them ?!? huh we are so scary now because of joxmax ! is vary bag company or?!
09/06/2011 20:59 OutlawNL#168
This is just some scanning what he just posted maybe with his info you can`t even get the files i will say good luck guys i won`t try it lol xd
09/06/2011 21:00 Dropdead*#169
Lol'd. Release or bb, dun wanna leave my ip on their servers.
09/06/2011 21:00 spozel#170
Quote:
Originally Posted by OMGG1 View Post
bastard
[Only registered and activated users can see links. Click Here To Register...] -> nmap
09/06/2011 21:00 tomuxp3#171
Quote:
Originally Posted by Chernobyl* View Post
So, as thread subject says, operation "SRO Blitzkrieq" starts soon. More info comes in next few hours.

For mods, please, stick this thread - this is going to be interesting.

=========================================
SRO Blitzkrieq -> Beginning

So, here the stuff begins. As far as many of you already know, there is a vSRO test server running on the net out there.

The IP address is pretty well known to everyone out here.

Code:
123.30.200.70
(u can use wireshark to get the ip addr of xtrap default vsro test update server)

You may try pinging it, to ensure it's up.

cmd -> ping 123.30.200.70

Well, let's see what we got there ?

Let's trace route.

Code:
cmd -> tracert 123.30.200.70
(first few hops removed)

Code:
  7   277 ms   276 ms   276 ms  80.156.161.62
  8   303 ms   304 ms   303 ms  203.162.217.25
  9   304 ms   304 ms   303 ms  static.vdc.vn [222.255.165.33]
 10   313 ms   313 ms   313 ms  203.162.231.9
 11   318 ms   318 ms   319 ms  static.vdc.vn [123.30.63.26]
 12   313 ms   313 ms   313 ms  static.vdc.vn [123.30.63.66]
 13   314 ms   314 ms   313 ms  dynamic.vdc.vn [123.30.200.254]
 14   313 ms   313 ms   313 ms  dynamic.vdc.vn [123.30.200.70]

Trace complete.
We see few gateways there, huh ? Seems like a pretty huge network, lulz.

Let's scan the "closest" machines to our target. (i'd preffer NMAP)

Code:
nmap -T4 -A -v 123.30.200.0-255
And what do we see there ? Lots of shit.

Tons of machines with MSSQL 2000 SP4 machines, available SMB services, ftp servers, etc...

=========================================

More hints comes shortly.



WHY YOU TELL US ABOUT YOUR SERVER?!?!? WE WANT PLAY NOT INFORMATION ABOUT IP OR SAME SHIT C MON OPEN SERVER!!!!!
09/06/2011 21:00 Getzabelz#172
Quote:
Originally Posted by Chernobyl* View Post
Shut the fuck up, finally, angry pedo kid.
He just said the truth dude xD, u got hacked :Oż
09/06/2011 21:01 Chernobyl*#173
Use any security methods you want, it depends on you.
09/06/2011 21:01 Nisanem#174
Open Roseeeeeee
09/06/2011 21:01 fro_#175
[Only registered and activated users can see links. Click Here To Register...]
09/06/2011 21:01 18andLife#176
Quote:
Originally Posted by Dropdead* View Post
Lol'd. Release or bb, dun wanna leave my ip on their servers.
if you do a SYN stealth scan (or whatever it's called, haven't used nmap for a while) they won't see your ip
09/06/2011 21:01 Gugujiji12#177
Ya open rose :o
09/06/2011 21:01 FierceCole#178
Quote:
Originally Posted by Chernobyl* View Post
Use any security methods you want, it depends on you.
Dun..Dun..Dunnnnnn
09/06/2011 21:02 Colb#179
Quote:
Originally Posted by Chernobyl* View Post
So, as thread subject says, operation "SRO Blitzkrieq" starts soon. More info comes in next few hours.

For mods, please, stick this thread - this is going to be interesting.

=========================================
SRO Blitzkrieq -> Beginning

So, here the stuff begins. As far as many of you already know, there is a vSRO test server running on the net out there.

The IP address is pretty well known to everyone out here.

Code:
123.30.200.70
(u can use wireshark to get the ip addr of xtrap default vsro test update server)

You may try pinging it, to ensure it's up.

cmd -> ping 123.30.200.70

Well, let's see what we got there ?

Let's trace route.

Code:
cmd -> tracert 123.30.200.70
(first few hops removed)

Code:
  7   277 ms   276 ms   276 ms  80.156.161.62
  8   303 ms   304 ms   303 ms  203.162.217.25
  9   304 ms   304 ms   303 ms  static.vdc.vn [222.255.165.33]
 10   313 ms   313 ms   313 ms  203.162.231.9
 11   318 ms   318 ms   319 ms  static.vdc.vn [123.30.63.26]
 12   313 ms   313 ms   313 ms  static.vdc.vn [123.30.63.66]
 13   314 ms   314 ms   313 ms  dynamic.vdc.vn [123.30.200.254]
 14   313 ms   313 ms   313 ms  dynamic.vdc.vn [123.30.200.70]

Trace complete.
We see few gateways there, huh ? Seems like a pretty huge network, lulz.

Let's scan the "closest" machines to our target. (i'd preffer NMAP)

Code:
nmap -T4 -A -v 123.30.200.0-255
And what do we see there ? Lots of shit.

Tons of machines with MSSQL 2000 SP4 machines, available SMB services, ftp servers, etc...

=========================================

More hints comes shortly.

I did all of that stuff about a week ago... lol. Even ran a brute through proxy for a week. Tried TCH Hydra. Tried PASV.
09/06/2011 21:02 OutlawNL#180
Quote:
Originally Posted by Chernobyl* View Post
Use any security methods you want, it depends on you.
So you actually want us to leave our IP`s on their servers as every1 says ? if you are 'releasing' <--- By giving us the way how you hack the files ( so you want us to get the files ) why don`t you just post your serverfiles in here isn`t that allot of easier ? or is it just me that thinks that`s easier ? xD